From 1c3b5519c2bf694e69639118ab84085b2e157f6c Mon Sep 17 00:00:00 2001 From: team-tf-cdk <84392119+team-tf-cdk@users.noreply.github.com> Date: Wed, 10 Jan 2024 12:59:22 +0100 Subject: [PATCH] feat!: update CDKTF version to `0.20.0` (#595) Triggered by https://github.com/cdktf/cdktf-repository-manager/actions/runs/7473872248 --------- Signed-off-by: team-tf-cdk --- .projen/deps.json | 6 +- .projenrc.js | 2 +- docs/adSecretBackend.csharp.md | 7 + docs/adSecretBackend.go.md | 19 +- docs/adSecretBackend.java.md | 7 + docs/adSecretBackend.python.md | 7 + docs/adSecretBackend.typescript.md | 7 + docs/adSecretLibrary.csharp.md | 7 + docs/adSecretLibrary.go.md | 19 +- docs/adSecretLibrary.java.md | 7 + docs/adSecretLibrary.python.md | 7 + docs/adSecretLibrary.typescript.md | 7 + docs/adSecretRole.csharp.md | 7 + docs/adSecretRole.go.md | 19 +- docs/adSecretRole.java.md | 7 + docs/adSecretRole.python.md | 7 + docs/adSecretRole.typescript.md | 7 + docs/alicloudAuthBackendRole.csharp.md | 7 + docs/alicloudAuthBackendRole.go.md | 19 +- docs/alicloudAuthBackendRole.java.md | 7 + docs/alicloudAuthBackendRole.python.md | 7 + docs/alicloudAuthBackendRole.typescript.md | 7 + docs/approleAuthBackendLogin.csharp.md | 7 + docs/approleAuthBackendLogin.go.md | 19 +- docs/approleAuthBackendLogin.java.md | 7 + docs/approleAuthBackendLogin.python.md | 7 + docs/approleAuthBackendLogin.typescript.md | 7 + docs/approleAuthBackendRole.csharp.md | 7 + docs/approleAuthBackendRole.go.md | 19 +- docs/approleAuthBackendRole.java.md | 7 + docs/approleAuthBackendRole.python.md | 7 + docs/approleAuthBackendRole.typescript.md | 7 + docs/approleAuthBackendRoleSecretId.csharp.md | 7 + docs/approleAuthBackendRoleSecretId.go.md | 19 +- docs/approleAuthBackendRoleSecretId.java.md | 7 + docs/approleAuthBackendRoleSecretId.python.md | 7 + ...proleAuthBackendRoleSecretId.typescript.md | 7 + docs/audit.csharp.md | 7 + docs/audit.go.md | 19 +- docs/audit.java.md | 7 + docs/audit.python.md | 7 + docs/audit.typescript.md | 7 + docs/auditRequestHeader.csharp.md | 7 + docs/auditRequestHeader.go.md | 19 +- docs/auditRequestHeader.java.md | 7 + docs/auditRequestHeader.python.md | 7 + docs/auditRequestHeader.typescript.md | 7 + docs/authBackend.csharp.md | 24 + docs/authBackend.go.md | 42 +- docs/authBackend.java.md | 24 + docs/authBackend.python.md | 26 + docs/authBackend.typescript.md | 24 + docs/awsAuthBackendCert.csharp.md | 7 + docs/awsAuthBackendCert.go.md | 19 +- docs/awsAuthBackendCert.java.md | 7 + docs/awsAuthBackendCert.python.md | 7 + docs/awsAuthBackendCert.typescript.md | 7 + docs/awsAuthBackendClient.csharp.md | 7 + docs/awsAuthBackendClient.go.md | 19 +- docs/awsAuthBackendClient.java.md | 7 + docs/awsAuthBackendClient.python.md | 7 + docs/awsAuthBackendClient.typescript.md | 7 + docs/awsAuthBackendConfigIdentity.csharp.md | 7 + docs/awsAuthBackendConfigIdentity.go.md | 19 +- docs/awsAuthBackendConfigIdentity.java.md | 7 + docs/awsAuthBackendConfigIdentity.python.md | 7 + ...awsAuthBackendConfigIdentity.typescript.md | 7 + .../awsAuthBackendIdentityWhitelist.csharp.md | 7 + docs/awsAuthBackendIdentityWhitelist.go.md | 19 +- docs/awsAuthBackendIdentityWhitelist.java.md | 7 + .../awsAuthBackendIdentityWhitelist.python.md | 7 + ...AuthBackendIdentityWhitelist.typescript.md | 7 + docs/awsAuthBackendLogin.csharp.md | 7 + docs/awsAuthBackendLogin.go.md | 19 +- docs/awsAuthBackendLogin.java.md | 7 + docs/awsAuthBackendLogin.python.md | 7 + docs/awsAuthBackendLogin.typescript.md | 7 + docs/awsAuthBackendRole.csharp.md | 7 + docs/awsAuthBackendRole.go.md | 19 +- docs/awsAuthBackendRole.java.md | 7 + docs/awsAuthBackendRole.python.md | 7 + docs/awsAuthBackendRole.typescript.md | 7 + docs/awsAuthBackendRoleTag.csharp.md | 7 + docs/awsAuthBackendRoleTag.go.md | 19 +- docs/awsAuthBackendRoleTag.java.md | 7 + docs/awsAuthBackendRoleTag.python.md | 7 + docs/awsAuthBackendRoleTag.typescript.md | 7 + docs/awsAuthBackendRoletagBlacklist.csharp.md | 7 + docs/awsAuthBackendRoletagBlacklist.go.md | 19 +- docs/awsAuthBackendRoletagBlacklist.java.md | 7 + docs/awsAuthBackendRoletagBlacklist.python.md | 7 + ...sAuthBackendRoletagBlacklist.typescript.md | 7 + docs/awsAuthBackendStsRole.csharp.md | 7 + docs/awsAuthBackendStsRole.go.md | 19 +- docs/awsAuthBackendStsRole.java.md | 7 + docs/awsAuthBackendStsRole.python.md | 7 + docs/awsAuthBackendStsRole.typescript.md | 7 + docs/awsSecretBackend.csharp.md | 7 + docs/awsSecretBackend.go.md | 19 +- docs/awsSecretBackend.java.md | 7 + docs/awsSecretBackend.python.md | 7 + docs/awsSecretBackend.typescript.md | 7 + docs/awsSecretBackendRole.csharp.md | 7 + docs/awsSecretBackendRole.go.md | 19 +- docs/awsSecretBackendRole.java.md | 7 + docs/awsSecretBackendRole.python.md | 7 + docs/awsSecretBackendRole.typescript.md | 7 + docs/awsSecretBackendStaticRole.csharp.md | 7 + docs/awsSecretBackendStaticRole.go.md | 19 +- docs/awsSecretBackendStaticRole.java.md | 7 + docs/awsSecretBackendStaticRole.python.md | 7 + docs/awsSecretBackendStaticRole.typescript.md | 7 + docs/azureAuthBackendConfig.csharp.md | 7 + docs/azureAuthBackendConfig.go.md | 19 +- docs/azureAuthBackendConfig.java.md | 7 + docs/azureAuthBackendConfig.python.md | 7 + docs/azureAuthBackendConfig.typescript.md | 7 + docs/azureAuthBackendRole.csharp.md | 7 + docs/azureAuthBackendRole.go.md | 19 +- docs/azureAuthBackendRole.java.md | 7 + docs/azureAuthBackendRole.python.md | 7 + docs/azureAuthBackendRole.typescript.md | 7 + docs/azureSecretBackend.csharp.md | 7 + docs/azureSecretBackend.go.md | 19 +- docs/azureSecretBackend.java.md | 7 + docs/azureSecretBackend.python.md | 7 + docs/azureSecretBackend.typescript.md | 7 + docs/azureSecretBackendRole.csharp.md | 41 + docs/azureSecretBackendRole.go.md | 65 +- docs/azureSecretBackendRole.java.md | 41 + docs/azureSecretBackendRole.python.md | 45 + docs/azureSecretBackendRole.typescript.md | 41 + docs/certAuthBackendRole.csharp.md | 7 + docs/certAuthBackendRole.go.md | 19 +- docs/certAuthBackendRole.java.md | 7 + docs/certAuthBackendRole.python.md | 7 + docs/certAuthBackendRole.typescript.md | 7 + docs/consulSecretBackend.csharp.md | 7 + docs/consulSecretBackend.go.md | 19 +- docs/consulSecretBackend.java.md | 7 + docs/consulSecretBackend.python.md | 7 + docs/consulSecretBackend.typescript.md | 7 + docs/consulSecretBackendRole.csharp.md | 7 + docs/consulSecretBackendRole.go.md | 19 +- docs/consulSecretBackendRole.java.md | 7 + docs/consulSecretBackendRole.python.md | 7 + docs/consulSecretBackendRole.typescript.md | 7 + docs/dataVaultAdAccessCredentials.csharp.md | 9 + docs/dataVaultAdAccessCredentials.go.md | 21 +- docs/dataVaultAdAccessCredentials.java.md | 9 + docs/dataVaultAdAccessCredentials.python.md | 9 + ...dataVaultAdAccessCredentials.typescript.md | 9 + ...ataVaultApproleAuthBackendRoleId.csharp.md | 9 + docs/dataVaultApproleAuthBackendRoleId.go.md | 21 +- .../dataVaultApproleAuthBackendRoleId.java.md | 9 + ...ataVaultApproleAuthBackendRoleId.python.md | 9 + ...aultApproleAuthBackendRoleId.typescript.md | 9 + docs/dataVaultAuthBackend.csharp.md | 9 + docs/dataVaultAuthBackend.go.md | 21 +- docs/dataVaultAuthBackend.java.md | 9 + docs/dataVaultAuthBackend.python.md | 9 + docs/dataVaultAuthBackend.typescript.md | 9 + docs/dataVaultAuthBackends.csharp.md | 9 + docs/dataVaultAuthBackends.go.md | 21 +- docs/dataVaultAuthBackends.java.md | 9 + docs/dataVaultAuthBackends.python.md | 9 + docs/dataVaultAuthBackends.typescript.md | 9 + docs/dataVaultAwsAccessCredentials.csharp.md | 9 + docs/dataVaultAwsAccessCredentials.go.md | 21 +- docs/dataVaultAwsAccessCredentials.java.md | 9 + docs/dataVaultAwsAccessCredentials.python.md | 9 + ...ataVaultAwsAccessCredentials.typescript.md | 9 + ...aVaultAwsStaticAccessCredentials.csharp.md | 9 + .../dataVaultAwsStaticAccessCredentials.go.md | 21 +- ...ataVaultAwsStaticAccessCredentials.java.md | 9 + ...aVaultAwsStaticAccessCredentials.python.md | 9 + ...ltAwsStaticAccessCredentials.typescript.md | 9 + .../dataVaultAzureAccessCredentials.csharp.md | 9 + docs/dataVaultAzureAccessCredentials.go.md | 21 +- docs/dataVaultAzureAccessCredentials.java.md | 9 + .../dataVaultAzureAccessCredentials.python.md | 9 + ...aVaultAzureAccessCredentials.typescript.md | 9 + docs/dataVaultGcpAuthBackendRole.csharp.md | 9 + docs/dataVaultGcpAuthBackendRole.go.md | 21 +- docs/dataVaultGcpAuthBackendRole.java.md | 9 + docs/dataVaultGcpAuthBackendRole.python.md | 9 + .../dataVaultGcpAuthBackendRole.typescript.md | 9 + docs/dataVaultGenericSecret.csharp.md | 9 + docs/dataVaultGenericSecret.go.md | 21 +- docs/dataVaultGenericSecret.java.md | 9 + docs/dataVaultGenericSecret.python.md | 9 + docs/dataVaultGenericSecret.typescript.md | 9 + docs/dataVaultIdentityEntity.csharp.md | 26 + docs/dataVaultIdentityEntity.go.md | 44 +- docs/dataVaultIdentityEntity.java.md | 26 + docs/dataVaultIdentityEntity.python.md | 28 + docs/dataVaultIdentityEntity.typescript.md | 26 + docs/dataVaultIdentityGroup.csharp.md | 9 + docs/dataVaultIdentityGroup.go.md | 21 +- docs/dataVaultIdentityGroup.java.md | 9 + docs/dataVaultIdentityGroup.python.md | 9 + docs/dataVaultIdentityGroup.typescript.md | 9 + ...dataVaultIdentityOidcClientCreds.csharp.md | 9 + docs/dataVaultIdentityOidcClientCreds.go.md | 21 +- docs/dataVaultIdentityOidcClientCreds.java.md | 9 + ...dataVaultIdentityOidcClientCreds.python.md | 9 + ...VaultIdentityOidcClientCreds.typescript.md | 9 + ...ataVaultIdentityOidcOpenidConfig.csharp.md | 9 + docs/dataVaultIdentityOidcOpenidConfig.go.md | 21 +- .../dataVaultIdentityOidcOpenidConfig.java.md | 9 + ...ataVaultIdentityOidcOpenidConfig.python.md | 9 + ...aultIdentityOidcOpenidConfig.typescript.md | 9 + .../dataVaultIdentityOidcPublicKeys.csharp.md | 9 + docs/dataVaultIdentityOidcPublicKeys.go.md | 21 +- docs/dataVaultIdentityOidcPublicKeys.java.md | 9 + .../dataVaultIdentityOidcPublicKeys.python.md | 9 + ...aVaultIdentityOidcPublicKeys.typescript.md | 9 + ...VaultKubernetesAuthBackendConfig.csharp.md | 9 + ...dataVaultKubernetesAuthBackendConfig.go.md | 21 +- ...taVaultKubernetesAuthBackendConfig.java.md | 9 + ...VaultKubernetesAuthBackendConfig.python.md | 9 + ...tKubernetesAuthBackendConfig.typescript.md | 9 + ...taVaultKubernetesAuthBackendRole.csharp.md | 9 + docs/dataVaultKubernetesAuthBackendRole.go.md | 21 +- ...dataVaultKubernetesAuthBackendRole.java.md | 9 + ...taVaultKubernetesAuthBackendRole.python.md | 9 + ...ultKubernetesAuthBackendRole.typescript.md | 9 + ...ultKubernetesServiceAccountToken.csharp.md | 9 + ...taVaultKubernetesServiceAccountToken.go.md | 21 +- ...VaultKubernetesServiceAccountToken.java.md | 9 + ...ultKubernetesServiceAccountToken.python.md | 9 + ...ubernetesServiceAccountToken.typescript.md | 9 + docs/dataVaultKvSecret.csharp.md | 9 + docs/dataVaultKvSecret.go.md | 21 +- docs/dataVaultKvSecret.java.md | 9 + docs/dataVaultKvSecret.python.md | 9 + docs/dataVaultKvSecret.typescript.md | 9 + docs/dataVaultKvSecretSubkeysV2.csharp.md | 9 + docs/dataVaultKvSecretSubkeysV2.go.md | 21 +- docs/dataVaultKvSecretSubkeysV2.java.md | 9 + docs/dataVaultKvSecretSubkeysV2.python.md | 9 + docs/dataVaultKvSecretSubkeysV2.typescript.md | 9 + docs/dataVaultKvSecretV2.csharp.md | 9 + docs/dataVaultKvSecretV2.go.md | 21 +- docs/dataVaultKvSecretV2.java.md | 9 + docs/dataVaultKvSecretV2.python.md | 9 + docs/dataVaultKvSecretV2.typescript.md | 9 + docs/dataVaultKvSecretsList.csharp.md | 9 + docs/dataVaultKvSecretsList.go.md | 21 +- docs/dataVaultKvSecretsList.java.md | 9 + docs/dataVaultKvSecretsList.python.md | 9 + docs/dataVaultKvSecretsList.typescript.md | 9 + docs/dataVaultKvSecretsListV2.csharp.md | 9 + docs/dataVaultKvSecretsListV2.go.md | 21 +- docs/dataVaultKvSecretsListV2.java.md | 9 + docs/dataVaultKvSecretsListV2.python.md | 9 + docs/dataVaultKvSecretsListV2.typescript.md | 9 + .../dataVaultLdapDynamicCredentials.csharp.md | 9 + docs/dataVaultLdapDynamicCredentials.go.md | 21 +- docs/dataVaultLdapDynamicCredentials.java.md | 9 + .../dataVaultLdapDynamicCredentials.python.md | 9 + ...aVaultLdapDynamicCredentials.typescript.md | 9 + docs/dataVaultLdapStaticCredentials.csharp.md | 9 + docs/dataVaultLdapStaticCredentials.go.md | 21 +- docs/dataVaultLdapStaticCredentials.java.md | 9 + docs/dataVaultLdapStaticCredentials.python.md | 9 + ...taVaultLdapStaticCredentials.typescript.md | 9 + docs/dataVaultNomadAccessToken.csharp.md | 9 + docs/dataVaultNomadAccessToken.go.md | 21 +- docs/dataVaultNomadAccessToken.java.md | 9 + docs/dataVaultNomadAccessToken.python.md | 9 + docs/dataVaultNomadAccessToken.typescript.md | 9 + .../dataVaultPkiSecretBackendIssuer.csharp.md | 9 + docs/dataVaultPkiSecretBackendIssuer.go.md | 21 +- docs/dataVaultPkiSecretBackendIssuer.java.md | 9 + .../dataVaultPkiSecretBackendIssuer.python.md | 9 + ...aVaultPkiSecretBackendIssuer.typescript.md | 9 + ...dataVaultPkiSecretBackendIssuers.csharp.md | 9 + docs/dataVaultPkiSecretBackendIssuers.go.md | 21 +- docs/dataVaultPkiSecretBackendIssuers.java.md | 9 + ...dataVaultPkiSecretBackendIssuers.python.md | 9 + ...VaultPkiSecretBackendIssuers.typescript.md | 9 + docs/dataVaultPkiSecretBackendKey.csharp.md | 9 + docs/dataVaultPkiSecretBackendKey.go.md | 21 +- docs/dataVaultPkiSecretBackendKey.java.md | 9 + docs/dataVaultPkiSecretBackendKey.python.md | 9 + ...dataVaultPkiSecretBackendKey.typescript.md | 9 + docs/dataVaultPkiSecretBackendKeys.csharp.md | 9 + docs/dataVaultPkiSecretBackendKeys.go.md | 21 +- docs/dataVaultPkiSecretBackendKeys.java.md | 9 + docs/dataVaultPkiSecretBackendKeys.python.md | 9 + ...ataVaultPkiSecretBackendKeys.typescript.md | 9 + docs/dataVaultPolicyDocument.csharp.md | 60 + docs/dataVaultPolicyDocument.go.md | 90 +- docs/dataVaultPolicyDocument.java.md | 60 + docs/dataVaultPolicyDocument.python.md | 66 + docs/dataVaultPolicyDocument.typescript.md | 60 + docs/dataVaultRaftAutopilotState.csharp.md | 9 + docs/dataVaultRaftAutopilotState.go.md | 21 +- docs/dataVaultRaftAutopilotState.java.md | 9 + docs/dataVaultRaftAutopilotState.python.md | 9 + .../dataVaultRaftAutopilotState.typescript.md | 9 + docs/dataVaultTransformDecode.csharp.md | 9 + docs/dataVaultTransformDecode.go.md | 21 +- docs/dataVaultTransformDecode.java.md | 9 + docs/dataVaultTransformDecode.python.md | 9 + docs/dataVaultTransformDecode.typescript.md | 9 + docs/dataVaultTransformEncode.csharp.md | 9 + docs/dataVaultTransformEncode.go.md | 21 +- docs/dataVaultTransformEncode.java.md | 9 + docs/dataVaultTransformEncode.python.md | 9 + docs/dataVaultTransformEncode.typescript.md | 9 + docs/dataVaultTransitDecrypt.csharp.md | 9 + docs/dataVaultTransitDecrypt.go.md | 21 +- docs/dataVaultTransitDecrypt.java.md | 9 + docs/dataVaultTransitDecrypt.python.md | 9 + docs/dataVaultTransitDecrypt.typescript.md | 9 + docs/dataVaultTransitEncrypt.csharp.md | 9 + docs/dataVaultTransitEncrypt.go.md | 21 +- docs/dataVaultTransitEncrypt.java.md | 9 + docs/dataVaultTransitEncrypt.python.md | 9 + docs/dataVaultTransitEncrypt.typescript.md | 9 + .../databaseSecretBackendConnection.csharp.md | 7 + docs/databaseSecretBackendConnection.go.md | 127 +- docs/databaseSecretBackendConnection.java.md | 7 + .../databaseSecretBackendConnection.python.md | 7 + ...abaseSecretBackendConnection.typescript.md | 7 + docs/databaseSecretBackendRole.csharp.md | 7 + docs/databaseSecretBackendRole.go.md | 19 +- docs/databaseSecretBackendRole.java.md | 7 + docs/databaseSecretBackendRole.python.md | 7 + docs/databaseSecretBackendRole.typescript.md | 7 + .../databaseSecretBackendStaticRole.csharp.md | 7 + docs/databaseSecretBackendStaticRole.go.md | 19 +- docs/databaseSecretBackendStaticRole.java.md | 7 + .../databaseSecretBackendStaticRole.python.md | 7 + ...abaseSecretBackendStaticRole.typescript.md | 7 + docs/databaseSecretsMount.csharp.md | 313 +++ docs/databaseSecretsMount.go.md | 433 +++- docs/databaseSecretsMount.java.md | 313 +++ docs/databaseSecretsMount.python.md | 349 +++ docs/databaseSecretsMount.typescript.md | 313 +++ docs/egpPolicy.csharp.md | 7 + docs/egpPolicy.go.md | 19 +- docs/egpPolicy.java.md | 7 + docs/egpPolicy.python.md | 7 + docs/egpPolicy.typescript.md | 7 + docs/gcpAuthBackend.csharp.md | 7 + docs/gcpAuthBackend.go.md | 25 +- docs/gcpAuthBackend.java.md | 7 + docs/gcpAuthBackend.python.md | 7 + docs/gcpAuthBackend.typescript.md | 7 + docs/gcpAuthBackendRole.csharp.md | 7 + docs/gcpAuthBackendRole.go.md | 19 +- docs/gcpAuthBackendRole.java.md | 7 + docs/gcpAuthBackendRole.python.md | 7 + docs/gcpAuthBackendRole.typescript.md | 7 + docs/gcpSecretBackend.csharp.md | 7 + docs/gcpSecretBackend.go.md | 19 +- docs/gcpSecretBackend.java.md | 7 + docs/gcpSecretBackend.python.md | 7 + docs/gcpSecretBackend.typescript.md | 7 + docs/gcpSecretImpersonatedAccount.csharp.md | 7 + docs/gcpSecretImpersonatedAccount.go.md | 19 +- docs/gcpSecretImpersonatedAccount.java.md | 7 + docs/gcpSecretImpersonatedAccount.python.md | 7 + ...gcpSecretImpersonatedAccount.typescript.md | 7 + docs/gcpSecretRoleset.csharp.md | 24 + docs/gcpSecretRoleset.go.md | 42 +- docs/gcpSecretRoleset.java.md | 24 + docs/gcpSecretRoleset.python.md | 26 + docs/gcpSecretRoleset.typescript.md | 24 + docs/gcpSecretStaticAccount.csharp.md | 24 + docs/gcpSecretStaticAccount.go.md | 42 +- docs/gcpSecretStaticAccount.java.md | 24 + docs/gcpSecretStaticAccount.python.md | 26 + docs/gcpSecretStaticAccount.typescript.md | 24 + docs/genericEndpoint.csharp.md | 7 + docs/genericEndpoint.go.md | 19 +- docs/genericEndpoint.java.md | 7 + docs/genericEndpoint.python.md | 7 + docs/genericEndpoint.typescript.md | 7 + docs/genericSecret.csharp.md | 7 + docs/genericSecret.go.md | 19 +- docs/genericSecret.java.md | 7 + docs/genericSecret.python.md | 7 + docs/genericSecret.typescript.md | 7 + docs/githubAuthBackend.csharp.md | 24 + docs/githubAuthBackend.go.md | 42 +- docs/githubAuthBackend.java.md | 24 + docs/githubAuthBackend.python.md | 26 + docs/githubAuthBackend.typescript.md | 24 + docs/githubTeam.csharp.md | 7 + docs/githubTeam.go.md | 19 +- docs/githubTeam.java.md | 7 + docs/githubTeam.python.md | 7 + docs/githubTeam.typescript.md | 7 + docs/githubUser.csharp.md | 7 + docs/githubUser.go.md | 19 +- docs/githubUser.java.md | 7 + docs/githubUser.python.md | 7 + docs/githubUser.typescript.md | 7 + docs/identityEntity.csharp.md | 7 + docs/identityEntity.go.md | 19 +- docs/identityEntity.java.md | 7 + docs/identityEntity.python.md | 7 + docs/identityEntity.typescript.md | 7 + docs/identityEntityAlias.csharp.md | 7 + docs/identityEntityAlias.go.md | 19 +- docs/identityEntityAlias.java.md | 7 + docs/identityEntityAlias.python.md | 7 + docs/identityEntityAlias.typescript.md | 7 + docs/identityEntityPolicies.csharp.md | 7 + docs/identityEntityPolicies.go.md | 19 +- docs/identityEntityPolicies.java.md | 7 + docs/identityEntityPolicies.python.md | 7 + docs/identityEntityPolicies.typescript.md | 7 + docs/identityGroup.csharp.md | 7 + docs/identityGroup.go.md | 19 +- docs/identityGroup.java.md | 7 + docs/identityGroup.python.md | 7 + docs/identityGroup.typescript.md | 7 + docs/identityGroupAlias.csharp.md | 7 + docs/identityGroupAlias.go.md | 19 +- docs/identityGroupAlias.java.md | 7 + docs/identityGroupAlias.python.md | 7 + docs/identityGroupAlias.typescript.md | 7 + docs/identityGroupMemberEntityIds.csharp.md | 7 + docs/identityGroupMemberEntityIds.go.md | 19 +- docs/identityGroupMemberEntityIds.java.md | 7 + docs/identityGroupMemberEntityIds.python.md | 7 + ...identityGroupMemberEntityIds.typescript.md | 7 + docs/identityGroupMemberGroupIds.csharp.md | 7 + docs/identityGroupMemberGroupIds.go.md | 19 +- docs/identityGroupMemberGroupIds.java.md | 7 + docs/identityGroupMemberGroupIds.python.md | 7 + .../identityGroupMemberGroupIds.typescript.md | 7 + docs/identityGroupPolicies.csharp.md | 7 + docs/identityGroupPolicies.go.md | 19 +- docs/identityGroupPolicies.java.md | 7 + docs/identityGroupPolicies.python.md | 7 + docs/identityGroupPolicies.typescript.md | 7 + docs/identityMfaDuo.csharp.md | 7 + docs/identityMfaDuo.go.md | 19 +- docs/identityMfaDuo.java.md | 7 + docs/identityMfaDuo.python.md | 7 + docs/identityMfaDuo.typescript.md | 7 + docs/identityMfaLoginEnforcement.csharp.md | 7 + docs/identityMfaLoginEnforcement.go.md | 19 +- docs/identityMfaLoginEnforcement.java.md | 7 + docs/identityMfaLoginEnforcement.python.md | 7 + .../identityMfaLoginEnforcement.typescript.md | 7 + docs/identityMfaOkta.csharp.md | 7 + docs/identityMfaOkta.go.md | 19 +- docs/identityMfaOkta.java.md | 7 + docs/identityMfaOkta.python.md | 7 + docs/identityMfaOkta.typescript.md | 7 + docs/identityMfaPingid.csharp.md | 7 + docs/identityMfaPingid.go.md | 19 +- docs/identityMfaPingid.java.md | 7 + docs/identityMfaPingid.python.md | 7 + docs/identityMfaPingid.typescript.md | 7 + docs/identityMfaTotp.csharp.md | 7 + docs/identityMfaTotp.go.md | 19 +- docs/identityMfaTotp.java.md | 7 + docs/identityMfaTotp.python.md | 7 + docs/identityMfaTotp.typescript.md | 7 + docs/identityOidc.csharp.md | 7 + docs/identityOidc.go.md | 19 +- docs/identityOidc.java.md | 7 + docs/identityOidc.python.md | 7 + docs/identityOidc.typescript.md | 7 + docs/identityOidcAssignment.csharp.md | 7 + docs/identityOidcAssignment.go.md | 19 +- docs/identityOidcAssignment.java.md | 7 + docs/identityOidcAssignment.python.md | 7 + docs/identityOidcAssignment.typescript.md | 7 + docs/identityOidcClient.csharp.md | 7 + docs/identityOidcClient.go.md | 19 +- docs/identityOidcClient.java.md | 7 + docs/identityOidcClient.python.md | 7 + docs/identityOidcClient.typescript.md | 7 + docs/identityOidcKey.csharp.md | 7 + docs/identityOidcKey.go.md | 19 +- docs/identityOidcKey.java.md | 7 + docs/identityOidcKey.python.md | 7 + docs/identityOidcKey.typescript.md | 7 + docs/identityOidcKeyAllowedClientId.csharp.md | 7 + docs/identityOidcKeyAllowedClientId.go.md | 19 +- docs/identityOidcKeyAllowedClientId.java.md | 7 + docs/identityOidcKeyAllowedClientId.python.md | 7 + ...entityOidcKeyAllowedClientId.typescript.md | 7 + docs/identityOidcProvider.csharp.md | 7 + docs/identityOidcProvider.go.md | 19 +- docs/identityOidcProvider.java.md | 7 + docs/identityOidcProvider.python.md | 7 + docs/identityOidcProvider.typescript.md | 7 + docs/identityOidcRole.csharp.md | 7 + docs/identityOidcRole.go.md | 19 +- docs/identityOidcRole.java.md | 7 + docs/identityOidcRole.python.md | 7 + docs/identityOidcRole.typescript.md | 7 + docs/identityOidcScope.csharp.md | 7 + docs/identityOidcScope.go.md | 19 +- docs/identityOidcScope.java.md | 7 + docs/identityOidcScope.python.md | 7 + docs/identityOidcScope.typescript.md | 7 + docs/jwtAuthBackend.csharp.md | 24 + docs/jwtAuthBackend.go.md | 42 +- docs/jwtAuthBackend.java.md | 24 + docs/jwtAuthBackend.python.md | 26 + docs/jwtAuthBackend.typescript.md | 24 + docs/jwtAuthBackendRole.csharp.md | 7 + docs/jwtAuthBackendRole.go.md | 19 +- docs/jwtAuthBackendRole.java.md | 7 + docs/jwtAuthBackendRole.python.md | 7 + docs/jwtAuthBackendRole.typescript.md | 7 + docs/kmipSecretBackend.csharp.md | 7 + docs/kmipSecretBackend.go.md | 19 +- docs/kmipSecretBackend.java.md | 7 + docs/kmipSecretBackend.python.md | 7 + docs/kmipSecretBackend.typescript.md | 7 + docs/kmipSecretRole.csharp.md | 7 + docs/kmipSecretRole.go.md | 19 +- docs/kmipSecretRole.java.md | 7 + docs/kmipSecretRole.python.md | 7 + docs/kmipSecretRole.typescript.md | 7 + docs/kmipSecretScope.csharp.md | 7 + docs/kmipSecretScope.go.md | 19 +- docs/kmipSecretScope.java.md | 7 + docs/kmipSecretScope.python.md | 7 + docs/kmipSecretScope.typescript.md | 7 + docs/kubernetesAuthBackendConfig.csharp.md | 7 + docs/kubernetesAuthBackendConfig.go.md | 19 +- docs/kubernetesAuthBackendConfig.java.md | 7 + docs/kubernetesAuthBackendConfig.python.md | 7 + .../kubernetesAuthBackendConfig.typescript.md | 7 + docs/kubernetesAuthBackendRole.csharp.md | 7 + docs/kubernetesAuthBackendRole.go.md | 19 +- docs/kubernetesAuthBackendRole.java.md | 7 + docs/kubernetesAuthBackendRole.python.md | 7 + docs/kubernetesAuthBackendRole.typescript.md | 7 + docs/kubernetesSecretBackend.csharp.md | 7 + docs/kubernetesSecretBackend.go.md | 19 +- docs/kubernetesSecretBackend.java.md | 7 + docs/kubernetesSecretBackend.python.md | 7 + docs/kubernetesSecretBackend.typescript.md | 7 + docs/kubernetesSecretBackendRole.csharp.md | 7 + docs/kubernetesSecretBackendRole.go.md | 19 +- docs/kubernetesSecretBackendRole.java.md | 7 + docs/kubernetesSecretBackendRole.python.md | 7 + .../kubernetesSecretBackendRole.typescript.md | 7 + docs/kvSecret.csharp.md | 7 + docs/kvSecret.go.md | 19 +- docs/kvSecret.java.md | 7 + docs/kvSecret.python.md | 7 + docs/kvSecret.typescript.md | 7 + docs/kvSecretBackendV2.csharp.md | 7 + docs/kvSecretBackendV2.go.md | 19 +- docs/kvSecretBackendV2.java.md | 7 + docs/kvSecretBackendV2.python.md | 7 + docs/kvSecretBackendV2.typescript.md | 7 + docs/kvSecretV2.csharp.md | 7 + docs/kvSecretV2.go.md | 25 +- docs/kvSecretV2.java.md | 7 + docs/kvSecretV2.python.md | 7 + docs/kvSecretV2.typescript.md | 7 + docs/ldapAuthBackend.csharp.md | 7 + docs/ldapAuthBackend.go.md | 19 +- docs/ldapAuthBackend.java.md | 7 + docs/ldapAuthBackend.python.md | 7 + docs/ldapAuthBackend.typescript.md | 7 + docs/ldapAuthBackendGroup.csharp.md | 7 + docs/ldapAuthBackendGroup.go.md | 19 +- docs/ldapAuthBackendGroup.java.md | 7 + docs/ldapAuthBackendGroup.python.md | 7 + docs/ldapAuthBackendGroup.typescript.md | 7 + docs/ldapAuthBackendUser.csharp.md | 7 + docs/ldapAuthBackendUser.go.md | 19 +- docs/ldapAuthBackendUser.java.md | 7 + docs/ldapAuthBackendUser.python.md | 7 + docs/ldapAuthBackendUser.typescript.md | 7 + docs/ldapSecretBackend.csharp.md | 7 + docs/ldapSecretBackend.go.md | 19 +- docs/ldapSecretBackend.java.md | 7 + docs/ldapSecretBackend.python.md | 7 + docs/ldapSecretBackend.typescript.md | 7 + docs/ldapSecretBackendDynamicRole.csharp.md | 7 + docs/ldapSecretBackendDynamicRole.go.md | 19 +- docs/ldapSecretBackendDynamicRole.java.md | 7 + docs/ldapSecretBackendDynamicRole.python.md | 7 + ...ldapSecretBackendDynamicRole.typescript.md | 7 + docs/ldapSecretBackendLibrarySet.csharp.md | 7 + docs/ldapSecretBackendLibrarySet.go.md | 19 +- docs/ldapSecretBackendLibrarySet.java.md | 7 + docs/ldapSecretBackendLibrarySet.python.md | 7 + .../ldapSecretBackendLibrarySet.typescript.md | 7 + docs/ldapSecretBackendStaticRole.csharp.md | 7 + docs/ldapSecretBackendStaticRole.go.md | 19 +- docs/ldapSecretBackendStaticRole.java.md | 7 + docs/ldapSecretBackendStaticRole.python.md | 7 + .../ldapSecretBackendStaticRole.typescript.md | 7 + docs/managedKeys.csharp.md | 58 + docs/managedKeys.go.md | 88 +- docs/managedKeys.java.md | 58 + docs/managedKeys.python.md | 64 + docs/managedKeys.typescript.md | 58 + docs/mfaDuo.csharp.md | 7 + docs/mfaDuo.go.md | 19 +- docs/mfaDuo.java.md | 7 + docs/mfaDuo.python.md | 7 + docs/mfaDuo.typescript.md | 7 + docs/mfaOkta.csharp.md | 7 + docs/mfaOkta.go.md | 19 +- docs/mfaOkta.java.md | 7 + docs/mfaOkta.python.md | 7 + docs/mfaOkta.typescript.md | 7 + docs/mfaPingid.csharp.md | 7 + docs/mfaPingid.go.md | 19 +- docs/mfaPingid.java.md | 7 + docs/mfaPingid.python.md | 7 + docs/mfaPingid.typescript.md | 7 + docs/mfaTotp.csharp.md | 7 + docs/mfaTotp.go.md | 19 +- docs/mfaTotp.java.md | 7 + docs/mfaTotp.python.md | 7 + docs/mfaTotp.typescript.md | 7 + docs/mongodbatlasSecretBackend.csharp.md | 7 + docs/mongodbatlasSecretBackend.go.md | 19 +- docs/mongodbatlasSecretBackend.java.md | 7 + docs/mongodbatlasSecretBackend.python.md | 7 + docs/mongodbatlasSecretBackend.typescript.md | 7 + docs/mongodbatlasSecretRole.csharp.md | 7 + docs/mongodbatlasSecretRole.go.md | 19 +- docs/mongodbatlasSecretRole.java.md | 7 + docs/mongodbatlasSecretRole.python.md | 7 + docs/mongodbatlasSecretRole.typescript.md | 7 + docs/mount.csharp.md | 7 + docs/mount.go.md | 19 +- docs/mount.java.md | 7 + docs/mount.python.md | 7 + docs/mount.typescript.md | 7 + docs/namespace.csharp.md | 7 + docs/namespace.go.md | 19 +- docs/namespace.java.md | 7 + docs/namespace.python.md | 7 + docs/namespace.typescript.md | 7 + docs/nomadSecretBackend.csharp.md | 7 + docs/nomadSecretBackend.go.md | 19 +- docs/nomadSecretBackend.java.md | 7 + docs/nomadSecretBackend.python.md | 7 + docs/nomadSecretBackend.typescript.md | 7 + docs/nomadSecretRole.csharp.md | 7 + docs/nomadSecretRole.go.md | 19 +- docs/nomadSecretRole.java.md | 7 + docs/nomadSecretRole.python.md | 7 + docs/nomadSecretRole.typescript.md | 7 + docs/oktaAuthBackend.csharp.md | 41 + docs/oktaAuthBackend.go.md | 65 +- docs/oktaAuthBackend.java.md | 41 + docs/oktaAuthBackend.python.md | 45 + docs/oktaAuthBackend.typescript.md | 41 + docs/oktaAuthBackendGroup.csharp.md | 7 + docs/oktaAuthBackendGroup.go.md | 19 +- docs/oktaAuthBackendGroup.java.md | 7 + docs/oktaAuthBackendGroup.python.md | 7 + docs/oktaAuthBackendGroup.typescript.md | 7 + docs/oktaAuthBackendUser.csharp.md | 7 + docs/oktaAuthBackendUser.go.md | 19 +- docs/oktaAuthBackendUser.java.md | 7 + docs/oktaAuthBackendUser.python.md | 7 + docs/oktaAuthBackendUser.typescript.md | 7 + docs/passwordPolicy.csharp.md | 7 + docs/passwordPolicy.go.md | 19 +- docs/passwordPolicy.java.md | 7 + docs/passwordPolicy.python.md | 7 + docs/passwordPolicy.typescript.md | 7 + docs/pkiSecretBackendCert.csharp.md | 7 + docs/pkiSecretBackendCert.go.md | 19 +- docs/pkiSecretBackendCert.java.md | 7 + docs/pkiSecretBackendCert.python.md | 7 + docs/pkiSecretBackendCert.typescript.md | 7 + docs/pkiSecretBackendConfigCa.csharp.md | 7 + docs/pkiSecretBackendConfigCa.go.md | 19 +- docs/pkiSecretBackendConfigCa.java.md | 7 + docs/pkiSecretBackendConfigCa.python.md | 7 + docs/pkiSecretBackendConfigCa.typescript.md | 7 + docs/pkiSecretBackendConfigIssuers.csharp.md | 7 + docs/pkiSecretBackendConfigIssuers.go.md | 19 +- docs/pkiSecretBackendConfigIssuers.java.md | 7 + docs/pkiSecretBackendConfigIssuers.python.md | 7 + ...kiSecretBackendConfigIssuers.typescript.md | 7 + docs/pkiSecretBackendConfigUrls.csharp.md | 7 + docs/pkiSecretBackendConfigUrls.go.md | 19 +- docs/pkiSecretBackendConfigUrls.java.md | 7 + docs/pkiSecretBackendConfigUrls.python.md | 7 + docs/pkiSecretBackendConfigUrls.typescript.md | 7 + docs/pkiSecretBackendCrlConfig.csharp.md | 7 + docs/pkiSecretBackendCrlConfig.go.md | 19 +- docs/pkiSecretBackendCrlConfig.java.md | 7 + docs/pkiSecretBackendCrlConfig.python.md | 7 + docs/pkiSecretBackendCrlConfig.typescript.md | 7 + ...etBackendIntermediateCertRequest.csharp.md | 7 + ...SecretBackendIntermediateCertRequest.go.md | 19 +- ...cretBackendIntermediateCertRequest.java.md | 7 + ...etBackendIntermediateCertRequest.python.md | 7 + ...ckendIntermediateCertRequest.typescript.md | 7 + ...cretBackendIntermediateSetSigned.csharp.md | 7 + ...kiSecretBackendIntermediateSetSigned.go.md | 19 +- ...SecretBackendIntermediateSetSigned.java.md | 7 + ...cretBackendIntermediateSetSigned.python.md | 7 + ...BackendIntermediateSetSigned.typescript.md | 7 + docs/pkiSecretBackendIssuer.csharp.md | 7 + docs/pkiSecretBackendIssuer.go.md | 19 +- docs/pkiSecretBackendIssuer.java.md | 7 + docs/pkiSecretBackendIssuer.python.md | 7 + docs/pkiSecretBackendIssuer.typescript.md | 7 + docs/pkiSecretBackendKey.csharp.md | 7 + docs/pkiSecretBackendKey.go.md | 19 +- docs/pkiSecretBackendKey.java.md | 7 + docs/pkiSecretBackendKey.python.md | 7 + docs/pkiSecretBackendKey.typescript.md | 7 + docs/pkiSecretBackendRole.csharp.md | 24 + docs/pkiSecretBackendRole.go.md | 42 +- docs/pkiSecretBackendRole.java.md | 24 + docs/pkiSecretBackendRole.python.md | 26 + docs/pkiSecretBackendRole.typescript.md | 24 + docs/pkiSecretBackendRootCert.csharp.md | 7 + docs/pkiSecretBackendRootCert.go.md | 19 +- docs/pkiSecretBackendRootCert.java.md | 7 + docs/pkiSecretBackendRootCert.python.md | 7 + docs/pkiSecretBackendRootCert.typescript.md | 7 + ...ecretBackendRootSignIntermediate.csharp.md | 7 + ...pkiSecretBackendRootSignIntermediate.go.md | 19 +- ...iSecretBackendRootSignIntermediate.java.md | 7 + ...ecretBackendRootSignIntermediate.python.md | 7 + ...tBackendRootSignIntermediate.typescript.md | 7 + docs/pkiSecretBackendSign.csharp.md | 7 + docs/pkiSecretBackendSign.go.md | 19 +- docs/pkiSecretBackendSign.java.md | 7 + docs/pkiSecretBackendSign.python.md | 7 + docs/pkiSecretBackendSign.typescript.md | 7 + docs/policy.csharp.md | 7 + docs/policy.go.md | 19 +- docs/policy.java.md | 7 + docs/policy.python.md | 7 + docs/policy.typescript.md | 7 + docs/provider.csharp.md | 7 + docs/provider.go.md | 73 +- docs/provider.java.md | 7 + docs/provider.python.md | 7 + docs/provider.typescript.md | 7 + docs/quotaLeaseCount.csharp.md | 7 + docs/quotaLeaseCount.go.md | 19 +- docs/quotaLeaseCount.java.md | 7 + docs/quotaLeaseCount.python.md | 7 + docs/quotaLeaseCount.typescript.md | 7 + docs/quotaRateLimit.csharp.md | 7 + docs/quotaRateLimit.go.md | 19 +- docs/quotaRateLimit.java.md | 7 + docs/quotaRateLimit.python.md | 7 + docs/quotaRateLimit.typescript.md | 7 + docs/rabbitmqSecretBackend.csharp.md | 7 + docs/rabbitmqSecretBackend.go.md | 19 +- docs/rabbitmqSecretBackend.java.md | 7 + docs/rabbitmqSecretBackend.python.md | 7 + docs/rabbitmqSecretBackend.typescript.md | 7 + docs/rabbitmqSecretBackendRole.csharp.md | 58 + docs/rabbitmqSecretBackendRole.go.md | 88 +- docs/rabbitmqSecretBackendRole.java.md | 58 + docs/rabbitmqSecretBackendRole.python.md | 64 + docs/rabbitmqSecretBackendRole.typescript.md | 58 + docs/raftAutopilot.csharp.md | 7 + docs/raftAutopilot.go.md | 19 +- docs/raftAutopilot.java.md | 7 + docs/raftAutopilot.python.md | 7 + docs/raftAutopilot.typescript.md | 7 + docs/raftSnapshotAgentConfig.csharp.md | 7 + docs/raftSnapshotAgentConfig.go.md | 19 +- docs/raftSnapshotAgentConfig.java.md | 7 + docs/raftSnapshotAgentConfig.python.md | 7 + docs/raftSnapshotAgentConfig.typescript.md | 7 + docs/rgpPolicy.csharp.md | 7 + docs/rgpPolicy.go.md | 19 +- docs/rgpPolicy.java.md | 7 + docs/rgpPolicy.python.md | 7 + docs/rgpPolicy.typescript.md | 7 + docs/samlAuthBackend.csharp.md | 7 + docs/samlAuthBackend.go.md | 19 +- docs/samlAuthBackend.java.md | 7 + docs/samlAuthBackend.python.md | 7 + docs/samlAuthBackend.typescript.md | 7 + docs/samlAuthBackendRole.csharp.md | 7 + docs/samlAuthBackendRole.go.md | 19 +- docs/samlAuthBackendRole.java.md | 7 + docs/samlAuthBackendRole.python.md | 7 + docs/samlAuthBackendRole.typescript.md | 7 + docs/sshSecretBackendCa.csharp.md | 7 + docs/sshSecretBackendCa.go.md | 19 +- docs/sshSecretBackendCa.java.md | 7 + docs/sshSecretBackendCa.python.md | 7 + docs/sshSecretBackendCa.typescript.md | 7 + docs/sshSecretBackendRole.csharp.md | 24 + docs/sshSecretBackendRole.go.md | 42 +- docs/sshSecretBackendRole.java.md | 24 + docs/sshSecretBackendRole.python.md | 26 + docs/sshSecretBackendRole.typescript.md | 24 + docs/terraformCloudSecretBackend.csharp.md | 7 + docs/terraformCloudSecretBackend.go.md | 19 +- docs/terraformCloudSecretBackend.java.md | 7 + docs/terraformCloudSecretBackend.python.md | 7 + .../terraformCloudSecretBackend.typescript.md | 7 + docs/terraformCloudSecretCreds.csharp.md | 7 + docs/terraformCloudSecretCreds.go.md | 19 +- docs/terraformCloudSecretCreds.java.md | 7 + docs/terraformCloudSecretCreds.python.md | 7 + docs/terraformCloudSecretCreds.typescript.md | 7 + docs/terraformCloudSecretRole.csharp.md | 7 + docs/terraformCloudSecretRole.go.md | 19 +- docs/terraformCloudSecretRole.java.md | 7 + docs/terraformCloudSecretRole.python.md | 7 + docs/terraformCloudSecretRole.typescript.md | 7 + docs/token.csharp.md | 7 + docs/token.go.md | 19 +- docs/token.java.md | 7 + docs/token.python.md | 7 + docs/token.typescript.md | 7 + docs/tokenAuthBackendRole.csharp.md | 7 + docs/tokenAuthBackendRole.go.md | 19 +- docs/tokenAuthBackendRole.java.md | 7 + docs/tokenAuthBackendRole.python.md | 7 + docs/tokenAuthBackendRole.typescript.md | 7 + docs/transformAlphabet.csharp.md | 7 + docs/transformAlphabet.go.md | 19 +- docs/transformAlphabet.java.md | 7 + docs/transformAlphabet.python.md | 7 + docs/transformAlphabet.typescript.md | 7 + docs/transformRole.csharp.md | 7 + docs/transformRole.go.md | 19 +- docs/transformRole.java.md | 7 + docs/transformRole.python.md | 7 + docs/transformRole.typescript.md | 7 + docs/transformTemplate.csharp.md | 7 + docs/transformTemplate.go.md | 19 +- docs/transformTemplate.java.md | 7 + docs/transformTemplate.python.md | 7 + docs/transformTemplate.typescript.md | 7 + docs/transformTransformation.csharp.md | 7 + docs/transformTransformation.go.md | 19 +- docs/transformTransformation.java.md | 7 + docs/transformTransformation.python.md | 7 + docs/transformTransformation.typescript.md | 7 + docs/transitSecretBackendKey.csharp.md | 7 + docs/transitSecretBackendKey.go.md | 19 +- docs/transitSecretBackendKey.java.md | 7 + docs/transitSecretBackendKey.python.md | 7 + docs/transitSecretBackendKey.typescript.md | 7 + docs/transitSecretCacheConfig.csharp.md | 7 + docs/transitSecretCacheConfig.go.md | 19 +- docs/transitSecretCacheConfig.java.md | 7 + docs/transitSecretCacheConfig.python.md | 7 + docs/transitSecretCacheConfig.typescript.md | 7 + package.json | 8 +- scripts/check-for-upgrades.js | 16 +- src/ad-secret-backend/README.md | 2 +- src/ad-secret-backend/index.ts | 230 ++ src/ad-secret-library/README.md | 2 +- src/ad-secret-library/index.ts | 56 + src/ad-secret-role/README.md | 2 +- src/ad-secret-role/index.ts | 44 + src/alicloud-auth-backend-role/README.md | 2 +- src/alicloud-auth-backend-role/index.ts | 92 + src/approle-auth-backend-login/README.md | 2 +- src/approle-auth-backend-login/index.ts | 38 + .../README.md | 2 +- .../index.ts | 62 + src/approle-auth-backend-role/README.md | 2 +- src/approle-auth-backend-role/index.ts | 116 + src/audit-request-header/README.md | 2 +- src/audit-request-header/index.ts | 32 + src/audit/README.md | 2 +- src/audit/index.ts | 50 + src/auth-backend/README.md | 2 +- src/auth-backend/index.ts | 117 + src/aws-auth-backend-cert/README.md | 2 +- src/aws-auth-backend-cert/index.ts | 44 + src/aws-auth-backend-client/README.md | 2 +- src/aws-auth-backend-client/index.ts | 74 + .../README.md | 2 +- src/aws-auth-backend-config-identity/index.ts | 50 + .../README.md | 2 +- .../index.ts | 38 + src/aws-auth-backend-login/README.md | 2 +- src/aws-auth-backend-login/index.ts | 80 + src/aws-auth-backend-role-tag/README.md | 2 +- src/aws-auth-backend-role-tag/index.ts | 62 + src/aws-auth-backend-role/README.md | 2 +- src/aws-auth-backend-role/index.ts | 182 ++ .../README.md | 2 +- .../index.ts | 38 + src/aws-auth-backend-sts-role/README.md | 2 +- src/aws-auth-backend-sts-role/index.ts | 38 + src/aws-secret-backend-role/README.md | 2 +- src/aws-secret-backend-role/index.ts | 86 + src/aws-secret-backend-static-role/README.md | 2 +- src/aws-secret-backend-static-role/index.ts | 44 + src/aws-secret-backend/README.md | 2 +- src/aws-secret-backend/index.ts | 92 + src/azure-auth-backend-config/README.md | 2 +- src/azure-auth-backend-config/index.ts | 56 + src/azure-auth-backend-role/README.md | 2 +- src/azure-auth-backend-role/index.ts | 122 ++ src/azure-secret-backend-role/README.md | 2 +- src/azure-secret-backend-role/index.ts | 124 ++ src/azure-secret-backend/README.md | 2 +- src/azure-secret-backend/index.ts | 74 + src/cert-auth-backend-role/README.md | 2 +- src/cert-auth-backend-role/index.ts | 176 ++ src/consul-secret-backend-role/README.md | 2 +- src/consul-secret-backend-role/index.ts | 98 + src/consul-secret-backend/README.md | 2 +- src/consul-secret-backend/index.ts | 98 + .../README.md | 2 +- src/data-vault-ad-access-credentials/index.ts | 32 + .../README.md | 2 +- .../index.ts | 32 + src/data-vault-auth-backend/README.md | 2 +- src/data-vault-auth-backend/index.ts | 26 + src/data-vault-auth-backends/README.md | 2 +- src/data-vault-auth-backends/index.ts | 26 + .../README.md | 2 +- .../index.ts | 56 + .../README.md | 2 +- .../index.ts | 32 + .../README.md | 2 +- .../index.ts | 74 + .../README.md | 2 +- src/data-vault-gcp-auth-backend-role/index.ts | 86 + src/data-vault-generic-secret/README.md | 2 +- src/data-vault-generic-secret/index.ts | 38 + src/data-vault-identity-entity/README.md | 2 +- src/data-vault-identity-entity/index.ts | 61 + src/data-vault-identity-group/README.md | 2 +- src/data-vault-identity-group/index.ts | 50 + .../README.md | 2 +- .../index.ts | 26 + .../README.md | 2 +- .../index.ts | 26 + .../README.md | 2 +- .../index.ts | 26 + .../README.md | 2 +- .../index.ts | 62 + .../README.md | 2 +- .../index.ts | 92 + .../README.md | 2 +- .../index.ts | 50 + src/data-vault-kv-secret-subkeys-v2/README.md | 2 +- src/data-vault-kv-secret-subkeys-v2/index.ts | 44 + src/data-vault-kv-secret-v2/README.md | 2 +- src/data-vault-kv-secret-v2/index.ts | 38 + src/data-vault-kv-secret/README.md | 2 +- src/data-vault-kv-secret/index.ts | 26 + src/data-vault-kv-secrets-list-v2/README.md | 2 +- src/data-vault-kv-secrets-list-v2/index.ts | 32 + src/data-vault-kv-secrets-list/README.md | 2 +- src/data-vault-kv-secrets-list/index.ts | 26 + .../README.md | 2 +- .../index.ts | 32 + .../README.md | 2 +- .../index.ts | 32 + src/data-vault-nomad-access-token/README.md | 2 +- src/data-vault-nomad-access-token/index.ts | 32 + .../README.md | 2 +- .../index.ts | 32 + .../README.md | 2 +- .../index.ts | 26 + .../README.md | 2 +- .../index.ts | 32 + .../README.md | 2 +- .../index.ts | 26 + src/data-vault-policy-document/README.md | 2 +- src/data-vault-policy-document/index.ts | 137 ++ src/data-vault-raft-autopilot-state/README.md | 2 +- src/data-vault-raft-autopilot-state/index.ts | 20 + src/data-vault-transform-decode/README.md | 2 +- src/data-vault-transform-decode/index.ts | 68 + src/data-vault-transform-encode/README.md | 2 +- src/data-vault-transform-encode/index.ts | 68 + src/data-vault-transit-decrypt/README.md | 2 +- src/data-vault-transit-decrypt/index.ts | 44 + src/data-vault-transit-encrypt/README.md | 2 +- src/data-vault-transit-encrypt/index.ts | 50 + .../README.md | 2 +- .../index.ts | 1238 +++++++++++ src/database-secret-backend-role/README.md | 2 +- src/database-secret-backend-role/index.ts | 86 + .../README.md | 2 +- .../index.ts | 68 + src/database-secrets-mount/README.md | 2 +- src/database-secrets-mount/index.ts | 1910 +++++++++++++++++ src/egp-policy/README.md | 2 +- src/egp-policy/index.ts | 44 + src/gcp-auth-backend-role/README.md | 2 +- src/gcp-auth-backend-role/index.ts | 146 ++ src/gcp-auth-backend/README.md | 2 +- src/gcp-auth-backend/index.ts | 117 + src/gcp-secret-backend/README.md | 2 +- src/gcp-secret-backend/index.ts | 62 + src/gcp-secret-impersonated-account/README.md | 2 +- src/gcp-secret-impersonated-account/index.ts | 44 + src/gcp-secret-roleset/README.md | 2 +- src/gcp-secret-roleset/index.ts | 81 + src/gcp-secret-static-account/README.md | 2 +- src/gcp-secret-static-account/index.ts | 81 + src/generic-endpoint/README.md | 2 +- src/generic-endpoint/index.ts | 56 + src/generic-secret/README.md | 2 +- src/generic-secret/index.ts | 44 + src/github-auth-backend/README.md | 2 +- src/github-auth-backend/index.ts | 177 ++ src/github-team/README.md | 2 +- src/github-team/index.ts | 38 + src/github-user/README.md | 2 +- src/github-user/index.ts | 38 + src/identity-entity-alias/README.md | 2 +- src/identity-entity-alias/index.ts | 44 + src/identity-entity-policies/README.md | 2 +- src/identity-entity-policies/index.ts | 38 + src/identity-entity/README.md | 2 +- src/identity-entity/index.ts | 50 + src/identity-group-alias/README.md | 2 +- src/identity-group-alias/index.ts | 38 + .../README.md | 2 +- src/identity-group-member-entity-ids/index.ts | 38 + src/identity-group-member-group-ids/README.md | 2 +- src/identity-group-member-group-ids/index.ts | 38 + src/identity-group-policies/README.md | 2 +- src/identity-group-policies/index.ts | 38 + src/identity-group/README.md | 2 +- src/identity-group/index.ts | 74 + src/identity-mfa-duo/README.md | 2 +- src/identity-mfa-duo/index.ts | 56 + src/identity-mfa-login-enforcement/README.md | 2 +- src/identity-mfa-login-enforcement/index.ts | 56 + src/identity-mfa-okta/README.md | 2 +- src/identity-mfa-okta/index.ts | 50 + src/identity-mfa-pingid/README.md | 2 +- src/identity-mfa-pingid/index.ts | 32 + src/identity-mfa-totp/README.md | 2 +- src/identity-mfa-totp/index.ts | 68 + src/identity-oidc-assignment/README.md | 2 +- src/identity-oidc-assignment/index.ts | 38 + src/identity-oidc-client/README.md | 2 +- src/identity-oidc-client/index.ts | 62 + .../README.md | 2 +- .../index.ts | 32 + src/identity-oidc-key/README.md | 2 +- src/identity-oidc-key/index.ts | 50 + src/identity-oidc-provider/README.md | 2 +- src/identity-oidc-provider/index.ts | 50 + src/identity-oidc-role/README.md | 2 +- src/identity-oidc-role/index.ts | 50 + src/identity-oidc-scope/README.md | 2 +- src/identity-oidc-scope/index.ts | 38 + src/identity-oidc/README.md | 2 +- src/identity-oidc/index.ts | 26 + src/jwt-auth-backend-role/README.md | 2 +- src/jwt-auth-backend-role/index.ts | 188 ++ src/jwt-auth-backend/README.md | 2 +- src/jwt-auth-backend/index.ts | 201 ++ src/kmip-secret-backend/README.md | 2 +- src/kmip-secret-backend/index.ts | 92 + src/kmip-secret-role/README.md | 2 +- src/kmip-secret-role/index.ts | 140 ++ src/kmip-secret-scope/README.md | 2 +- src/kmip-secret-scope/index.ts | 38 + src/kubernetes-auth-backend-config/README.md | 2 +- src/kubernetes-auth-backend-config/index.ts | 68 + src/kubernetes-auth-backend-role/README.md | 2 +- src/kubernetes-auth-backend-role/index.ts | 110 + src/kubernetes-secret-backend-role/README.md | 2 +- src/kubernetes-secret-backend-role/index.ts | 92 + src/kubernetes-secret-backend/README.md | 2 +- src/kubernetes-secret-backend/index.ts | 110 + src/kv-secret-backend-v2/README.md | 2 +- src/kv-secret-backend-v2/index.ts | 44 + src/kv-secret-v2/README.md | 2 +- src/kv-secret-v2/index.ts | 105 + src/kv-secret/README.md | 2 +- src/kv-secret/index.ts | 32 + src/ldap-auth-backend-group/README.md | 2 +- src/ldap-auth-backend-group/index.ts | 38 + src/ldap-auth-backend-user/README.md | 2 +- src/ldap-auth-backend-user/index.ts | 44 + src/ldap-auth-backend/README.md | 2 +- src/ldap-auth-backend/index.ts | 236 ++ .../README.md | 2 +- src/ldap-secret-backend-dynamic-role/index.ts | 68 + src/ldap-secret-backend-library-set/README.md | 2 +- src/ldap-secret-backend-library-set/index.ts | 56 + src/ldap-secret-backend-static-role/README.md | 2 +- src/ldap-secret-backend-static-role/index.ts | 50 + src/ldap-secret-backend/README.md | 2 +- src/ldap-secret-backend/index.ts | 188 ++ src/managed-keys/README.md | 2 +- src/managed-keys/index.ts | 329 +++ src/mfa-duo/README.md | 2 +- src/mfa-duo/index.ts | 62 + src/mfa-okta/README.md | 2 +- src/mfa-okta/index.ts | 62 + src/mfa-pingid/README.md | 2 +- src/mfa-pingid/index.ts | 44 + src/mfa-totp/README.md | 2 +- src/mfa-totp/index.ts | 68 + src/mongodbatlas-secret-backend/README.md | 2 +- src/mongodbatlas-secret-backend/index.ts | 38 + src/mongodbatlas-secret-role/README.md | 2 +- src/mongodbatlas-secret-role/index.ts | 80 + src/mount/README.md | 2 +- src/mount/index.ts | 92 + src/namespace/README.md | 2 +- src/namespace/index.ts | 38 + src/nomad-secret-backend/README.md | 2 +- src/nomad-secret-backend/index.ts | 104 + src/nomad-secret-role/README.md | 2 +- src/nomad-secret-role/index.ts | 50 + src/okta-auth-backend-group/README.md | 2 +- src/okta-auth-backend-group/index.ts | 38 + src/okta-auth-backend-user/README.md | 2 +- src/okta-auth-backend-user/index.ts | 44 + src/okta-auth-backend/README.md | 2 +- src/okta-auth-backend/index.ts | 142 ++ src/password-policy/README.md | 2 +- src/password-policy/index.ts | 32 + src/pki-secret-backend-cert/README.md | 2 +- src/pki-secret-backend-cert/index.ts | 116 + src/pki-secret-backend-config-ca/README.md | 2 +- src/pki-secret-backend-config-ca/index.ts | 32 + .../README.md | 2 +- .../index.ts | 38 + src/pki-secret-backend-config-urls/README.md | 2 +- src/pki-secret-backend-config-urls/index.ts | 44 + src/pki-secret-backend-crl-config/README.md | 2 +- src/pki-secret-backend-crl-config/index.ts | 92 + .../README.md | 2 +- .../index.ts | 164 ++ .../README.md | 2 +- .../index.ts | 32 + src/pki-secret-backend-issuer/README.md | 2 +- src/pki-secret-backend-issuer/index.ts | 86 + src/pki-secret-backend-key/README.md | 2 +- src/pki-secret-backend-key/index.ts | 62 + src/pki-secret-backend-role/README.md | 2 +- src/pki-secret-backend-role/index.ts | 315 +++ src/pki-secret-backend-root-cert/README.md | 2 +- src/pki-secret-backend-root-cert/index.ts | 182 ++ .../README.md | 2 +- .../index.ts | 152 ++ src/pki-secret-backend-sign/README.md | 2 +- src/pki-secret-backend-sign/index.ts | 104 + src/policy/README.md | 2 +- src/policy/index.ts | 32 + src/provider/README.md | 2 +- src/provider/index.ts | 922 ++++++++ src/quota-lease-count/README.md | 2 +- src/quota-lease-count/index.ts | 44 + src/quota-rate-limit/README.md | 2 +- src/quota-rate-limit/index.ts | 56 + src/rabbitmq-secret-backend-role/README.md | 2 +- src/rabbitmq-secret-backend-role/index.ts | 143 ++ src/rabbitmq-secret-backend/README.md | 2 +- src/rabbitmq-secret-backend/index.ts | 86 + src/raft-autopilot/README.md | 2 +- src/raft-autopilot/index.ts | 62 + src/raft-snapshot-agent-config/README.md | 2 +- src/raft-snapshot-agent-config/index.ts | 182 ++ src/rgp-policy/README.md | 2 +- src/rgp-policy/index.ts | 38 + src/saml-auth-backend-role/README.md | 2 +- src/saml-auth-backend-role/index.ts | 116 + src/saml-auth-backend/README.md | 2 +- src/saml-auth-backend/index.ts | 80 + src/ssh-secret-backend-ca/README.md | 2 +- src/ssh-secret-backend-ca/index.ts | 44 + src/ssh-secret-backend-role/README.md | 2 +- src/ssh-secret-backend-role/index.ts | 201 ++ src/terraform-cloud-secret-backend/README.md | 2 +- src/terraform-cloud-secret-backend/index.ts | 68 + src/terraform-cloud-secret-creds/README.md | 2 +- src/terraform-cloud-secret-creds/index.ts | 32 + src/terraform-cloud-secret-role/README.md | 2 +- src/terraform-cloud-secret-role/index.ts | 62 + src/token-auth-backend-role/README.md | 2 +- src/token-auth-backend-role/index.ts | 128 ++ src/token/README.md | 2 +- src/token/index.ts | 104 + src/transform-alphabet/README.md | 2 +- src/transform-alphabet/index.ts | 38 + src/transform-role/README.md | 2 +- src/transform-role/index.ts | 38 + src/transform-template/README.md | 2 +- src/transform-template/index.ts | 62 + src/transform-transformation/README.md | 2 +- src/transform-transformation/index.ts | 74 + src/transit-secret-backend-key/README.md | 2 +- src/transit-secret-backend-key/index.ts | 98 + src/transit-secret-cache-config/README.md | 2 +- src/transit-secret-cache-config/index.ts | 32 + yarn.lock | 910 ++++---- 1209 files changed, 28185 insertions(+), 1789 deletions(-) diff --git a/.projen/deps.json b/.projen/deps.json index 2e8a4c9c..dba9b900 100644 --- a/.projen/deps.json +++ b/.projen/deps.json @@ -17,12 +17,12 @@ }, { "name": "cdktf-cli", - "version": "^0.19.0", + "version": "^0.20.0", "type": "build" }, { "name": "cdktf", - "version": "^0.19.0", + "version": "^0.20.0", "type": "build" }, { @@ -84,7 +84,7 @@ }, { "name": "cdktf", - "version": "^0.19.0", + "version": "^0.20.0", "type": "peer" }, { diff --git a/.projenrc.js b/.projenrc.js index b50f940d..24eb83ec 100644 --- a/.projenrc.js +++ b/.projenrc.js @@ -7,7 +7,7 @@ const { CdktfProviderProject } = require("@cdktf/provider-project"); const project = new CdktfProviderProject({ useCustomGithubRunner: false, terraformProvider: "hashicorp/vault@~> 3.7", - cdktfVersion: "^0.19.0", + cdktfVersion: "^0.20.0", constructsVersion: "^10.3.0", minNodeVersion: "18.12.0", jsiiVersion: "~5.2.0", diff --git a/docs/adSecretBackend.csharp.md b/docs/adSecretBackend.csharp.md index b34689d1..ea981808 100644 --- a/docs/adSecretBackend.csharp.md +++ b/docs/adSecretBackend.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -160,6 +161,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/adSecretBackend.go.md b/docs/adSecretBackend.go.md index d375f161..a6e9e451 100644 --- a/docs/adSecretBackend.go.md +++ b/docs/adSecretBackend.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/adsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretbackend" adsecretbackend.NewAdSecretBackend(scope Construct, id *string, config AdSecretBackendConfig) AdSecretBackend ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -160,6 +161,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -616,7 +623,7 @@ func ResetUseTokenGroups() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/adsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretbackend" adsecretbackend.AdSecretBackend_IsConstruct(x interface{}) *bool ``` @@ -648,7 +655,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/adsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretbackend" adsecretbackend.AdSecretBackend_IsTerraformElement(x interface{}) *bool ``` @@ -662,7 +669,7 @@ adsecretbackend.AdSecretBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/adsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretbackend" adsecretbackend.AdSecretBackend_IsTerraformResource(x interface{}) *bool ``` @@ -676,7 +683,7 @@ adsecretbackend.AdSecretBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/adsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretbackend" adsecretbackend.AdSecretBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1719,7 +1726,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/adsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretbackend" &adsecretbackend.AdSecretBackendConfig { Connection: interface{}, diff --git a/docs/adSecretBackend.java.md b/docs/adSecretBackend.java.md index cb2d710f..57be11fb 100644 --- a/docs/adSecretBackend.java.md +++ b/docs/adSecretBackend.java.md @@ -571,6 +571,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -677,6 +678,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/adSecretBackend.python.md b/docs/adSecretBackend.python.md index 7ee9ebd6..8a6e59ef 100644 --- a/docs/adSecretBackend.python.md +++ b/docs/adSecretBackend.python.md @@ -559,6 +559,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -670,6 +671,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/adSecretBackend.typescript.md b/docs/adSecretBackend.typescript.md index 0eda3ed1..742be0f8 100644 --- a/docs/adSecretBackend.typescript.md +++ b/docs/adSecretBackend.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -160,6 +161,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/adSecretLibrary.csharp.md b/docs/adSecretLibrary.csharp.md index da39bd7e..814460b2 100644 --- a/docs/adSecretLibrary.csharp.md +++ b/docs/adSecretLibrary.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/adSecretLibrary.go.md b/docs/adSecretLibrary.go.md index 539fd0a0..bf010478 100644 --- a/docs/adSecretLibrary.go.md +++ b/docs/adSecretLibrary.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/adsecretlibrary" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretlibrary" adsecretlibrary.NewAdSecretLibrary(scope Construct, id *string, config AdSecretLibraryConfig) AdSecretLibrary ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -406,7 +413,7 @@ func ResetTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/adsecretlibrary" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretlibrary" adsecretlibrary.AdSecretLibrary_IsConstruct(x interface{}) *bool ``` @@ -438,7 +445,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/adsecretlibrary" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretlibrary" adsecretlibrary.AdSecretLibrary_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +459,7 @@ adsecretlibrary.AdSecretLibrary_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/adsecretlibrary" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretlibrary" adsecretlibrary.AdSecretLibrary_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +473,7 @@ adsecretlibrary.AdSecretLibrary_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/adsecretlibrary" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretlibrary" adsecretlibrary.AdSecretLibrary_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -871,7 +878,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/adsecretlibrary" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretlibrary" &adsecretlibrary.AdSecretLibraryConfig { Connection: interface{}, diff --git a/docs/adSecretLibrary.java.md b/docs/adSecretLibrary.java.md index b10591d9..21c9c2e8 100644 --- a/docs/adSecretLibrary.java.md +++ b/docs/adSecretLibrary.java.md @@ -208,6 +208,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -284,6 +285,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/adSecretLibrary.python.md b/docs/adSecretLibrary.python.md index cba0dfc7..1a66168a 100644 --- a/docs/adSecretLibrary.python.md +++ b/docs/adSecretLibrary.python.md @@ -205,6 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -286,6 +287,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/adSecretLibrary.typescript.md b/docs/adSecretLibrary.typescript.md index 004cd529..fca53122 100644 --- a/docs/adSecretLibrary.typescript.md +++ b/docs/adSecretLibrary.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/adSecretRole.csharp.md b/docs/adSecretRole.csharp.md index 96c39c27..8c2941df 100644 --- a/docs/adSecretRole.csharp.md +++ b/docs/adSecretRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/adSecretRole.go.md b/docs/adSecretRole.go.md index 60dcd82d..83d14094 100644 --- a/docs/adSecretRole.go.md +++ b/docs/adSecretRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/adsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretrole" adsecretrole.NewAdSecretRole(scope Construct, id *string, config AdSecretRoleConfig) AdSecretRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -392,7 +399,7 @@ func ResetTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/adsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretrole" adsecretrole.AdSecretRole_IsConstruct(x interface{}) *bool ``` @@ -424,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/adsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretrole" adsecretrole.AdSecretRole_IsTerraformElement(x interface{}) *bool ``` @@ -438,7 +445,7 @@ adsecretrole.AdSecretRole_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/adsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretrole" adsecretrole.AdSecretRole_IsTerraformResource(x interface{}) *bool ``` @@ -452,7 +459,7 @@ adsecretrole.AdSecretRole_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/adsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretrole" adsecretrole.AdSecretRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -835,7 +842,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/adsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretrole" &adsecretrole.AdSecretRoleConfig { Connection: interface{}, diff --git a/docs/adSecretRole.java.md b/docs/adSecretRole.java.md index c7a0ed8f..2d3eac8e 100644 --- a/docs/adSecretRole.java.md +++ b/docs/adSecretRole.java.md @@ -181,6 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -255,6 +256,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/adSecretRole.python.md b/docs/adSecretRole.python.md index 05e83875..c2370379 100644 --- a/docs/adSecretRole.python.md +++ b/docs/adSecretRole.python.md @@ -179,6 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -258,6 +259,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/adSecretRole.typescript.md b/docs/adSecretRole.typescript.md index 4e496146..85123d1a 100644 --- a/docs/adSecretRole.typescript.md +++ b/docs/adSecretRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/alicloudAuthBackendRole.csharp.md b/docs/alicloudAuthBackendRole.csharp.md index af0b7b5a..99a67049 100644 --- a/docs/alicloudAuthBackendRole.csharp.md +++ b/docs/alicloudAuthBackendRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -137,6 +138,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/alicloudAuthBackendRole.go.md b/docs/alicloudAuthBackendRole.go.md index 4797c225..af8824c9 100644 --- a/docs/alicloudAuthBackendRole.go.md +++ b/docs/alicloudAuthBackendRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/alicloudauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/alicloudauthbackendrole" alicloudauthbackendrole.NewAlicloudAuthBackendRole(scope Construct, id *string, config AlicloudAuthBackendRoleConfig) AlicloudAuthBackendRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -137,6 +138,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -455,7 +462,7 @@ func ResetTokenType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/alicloudauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/alicloudauthbackendrole" alicloudauthbackendrole.AlicloudAuthBackendRole_IsConstruct(x interface{}) *bool ``` @@ -487,7 +494,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/alicloudauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/alicloudauthbackendrole" alicloudauthbackendrole.AlicloudAuthBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -501,7 +508,7 @@ alicloudauthbackendrole.AlicloudAuthBackendRole_IsTerraformElement(x interface{} ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/alicloudauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/alicloudauthbackendrole" alicloudauthbackendrole.AlicloudAuthBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -515,7 +522,7 @@ alicloudauthbackendrole.AlicloudAuthBackendRole_IsTerraformResource(x interface{ ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/alicloudauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/alicloudauthbackendrole" alicloudauthbackendrole.AlicloudAuthBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1052,7 +1059,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/alicloudauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/alicloudauthbackendrole" &alicloudauthbackendrole.AlicloudAuthBackendRoleConfig { Connection: interface{}, diff --git a/docs/alicloudAuthBackendRole.java.md b/docs/alicloudAuthBackendRole.java.md index dc609c3c..4bb1900a 100644 --- a/docs/alicloudAuthBackendRole.java.md +++ b/docs/alicloudAuthBackendRole.java.md @@ -278,6 +278,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -361,6 +362,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/alicloudAuthBackendRole.python.md b/docs/alicloudAuthBackendRole.python.md index 27ee8652..aa2b0034 100644 --- a/docs/alicloudAuthBackendRole.python.md +++ b/docs/alicloudAuthBackendRole.python.md @@ -275,6 +275,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -363,6 +364,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/alicloudAuthBackendRole.typescript.md b/docs/alicloudAuthBackendRole.typescript.md index 2c7181a0..02e07fc9 100644 --- a/docs/alicloudAuthBackendRole.typescript.md +++ b/docs/alicloudAuthBackendRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -137,6 +138,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/approleAuthBackendLogin.csharp.md b/docs/approleAuthBackendLogin.csharp.md index 30898617..384c9d7a 100644 --- a/docs/approleAuthBackendLogin.csharp.md +++ b/docs/approleAuthBackendLogin.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/approleAuthBackendLogin.go.md b/docs/approleAuthBackendLogin.go.md index e7e9b681..8e599009 100644 --- a/docs/approleAuthBackendLogin.go.md +++ b/docs/approleAuthBackendLogin.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/approleauthbackendlogin" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendlogin" approleauthbackendlogin.NewApproleAuthBackendLogin(scope Construct, id *string, config ApproleAuthBackendLoginConfig) ApproleAuthBackendLogin ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -399,7 +406,7 @@ func ResetSecretId() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/approleauthbackendlogin" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendlogin" approleauthbackendlogin.ApproleAuthBackendLogin_IsConstruct(x interface{}) *bool ``` @@ -431,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/approleauthbackendlogin" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendlogin" approleauthbackendlogin.ApproleAuthBackendLogin_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +452,7 @@ approleauthbackendlogin.ApproleAuthBackendLogin_IsTerraformElement(x interface{} ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/approleauthbackendlogin" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendlogin" approleauthbackendlogin.ApproleAuthBackendLogin_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +466,7 @@ approleauthbackendlogin.ApproleAuthBackendLogin_IsTerraformResource(x interface{ ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/approleauthbackendlogin" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendlogin" approleauthbackendlogin.ApproleAuthBackendLogin_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -875,7 +882,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/approleauthbackendlogin" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendlogin" &approleauthbackendlogin.ApproleAuthBackendLoginConfig { Connection: interface{}, diff --git a/docs/approleAuthBackendLogin.java.md b/docs/approleAuthBackendLogin.java.md index 57e38086..5a491062 100644 --- a/docs/approleAuthBackendLogin.java.md +++ b/docs/approleAuthBackendLogin.java.md @@ -169,6 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -244,6 +245,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/approleAuthBackendLogin.python.md b/docs/approleAuthBackendLogin.python.md index 90d35131..57262493 100644 --- a/docs/approleAuthBackendLogin.python.md +++ b/docs/approleAuthBackendLogin.python.md @@ -167,6 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -247,6 +248,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/approleAuthBackendLogin.typescript.md b/docs/approleAuthBackendLogin.typescript.md index 22679e16..2ccebabe 100644 --- a/docs/approleAuthBackendLogin.typescript.md +++ b/docs/approleAuthBackendLogin.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/approleAuthBackendRole.csharp.md b/docs/approleAuthBackendRole.csharp.md index 3ad0b7c7..b5c8ad2c 100644 --- a/docs/approleAuthBackendRole.csharp.md +++ b/docs/approleAuthBackendRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -142,6 +143,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/approleAuthBackendRole.go.md b/docs/approleAuthBackendRole.go.md index 6dddaa83..b2dba979 100644 --- a/docs/approleAuthBackendRole.go.md +++ b/docs/approleAuthBackendRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/approleauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendrole" approleauthbackendrole.NewApproleAuthBackendRole(scope Construct, id *string, config ApproleAuthBackendRoleConfig) ApproleAuthBackendRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -142,6 +143,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -490,7 +497,7 @@ func ResetTokenType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/approleauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendrole" approleauthbackendrole.ApproleAuthBackendRole_IsConstruct(x interface{}) *bool ``` @@ -522,7 +529,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/approleauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendrole" approleauthbackendrole.ApproleAuthBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -536,7 +543,7 @@ approleauthbackendrole.ApproleAuthBackendRole_IsTerraformElement(x interface{}) ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/approleauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendrole" approleauthbackendrole.ApproleAuthBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -550,7 +557,7 @@ approleauthbackendrole.ApproleAuthBackendRole_IsTerraformResource(x interface{}) ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/approleauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendrole" approleauthbackendrole.ApproleAuthBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1175,7 +1182,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/approleauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendrole" &approleauthbackendrole.ApproleAuthBackendRoleConfig { Connection: interface{}, diff --git a/docs/approleAuthBackendRole.java.md b/docs/approleAuthBackendRole.java.md index 31e91d76..9422403a 100644 --- a/docs/approleAuthBackendRole.java.md +++ b/docs/approleAuthBackendRole.java.md @@ -329,6 +329,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -417,6 +418,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/approleAuthBackendRole.python.md b/docs/approleAuthBackendRole.python.md index fb60a334..5130e834 100644 --- a/docs/approleAuthBackendRole.python.md +++ b/docs/approleAuthBackendRole.python.md @@ -325,6 +325,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -418,6 +419,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/approleAuthBackendRole.typescript.md b/docs/approleAuthBackendRole.typescript.md index a9c80828..ab518cda 100644 --- a/docs/approleAuthBackendRole.typescript.md +++ b/docs/approleAuthBackendRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -142,6 +143,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/approleAuthBackendRoleSecretId.csharp.md b/docs/approleAuthBackendRoleSecretId.csharp.md index 85faf7b1..f2497a2b 100644 --- a/docs/approleAuthBackendRoleSecretId.csharp.md +++ b/docs/approleAuthBackendRoleSecretId.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -133,6 +134,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/approleAuthBackendRoleSecretId.go.md b/docs/approleAuthBackendRoleSecretId.go.md index 3eb6934b..741a189d 100644 --- a/docs/approleAuthBackendRoleSecretId.go.md +++ b/docs/approleAuthBackendRoleSecretId.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/approleauthbackendrolesecretid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendrolesecretid" approleauthbackendrolesecretid.NewApproleAuthBackendRoleSecretId(scope Construct, id *string, config ApproleAuthBackendRoleSecretIdConfig) ApproleAuthBackendRoleSecretId ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -133,6 +134,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -427,7 +434,7 @@ func ResetWrappingTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/approleauthbackendrolesecretid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendrolesecretid" approleauthbackendrolesecretid.ApproleAuthBackendRoleSecretId_IsConstruct(x interface{}) *bool ``` @@ -459,7 +466,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/approleauthbackendrolesecretid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendrolesecretid" approleauthbackendrolesecretid.ApproleAuthBackendRoleSecretId_IsTerraformElement(x interface{}) *bool ``` @@ -473,7 +480,7 @@ approleauthbackendrolesecretid.ApproleAuthBackendRoleSecretId_IsTerraformElement ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/approleauthbackendrolesecretid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendrolesecretid" approleauthbackendrolesecretid.ApproleAuthBackendRoleSecretId_IsTerraformResource(x interface{}) *bool ``` @@ -487,7 +494,7 @@ approleauthbackendrolesecretid.ApproleAuthBackendRoleSecretId_IsTerraformResourc ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/approleauthbackendrolesecretid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendrolesecretid" approleauthbackendrolesecretid.ApproleAuthBackendRoleSecretId_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -947,7 +954,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/approleauthbackendrolesecretid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendrolesecretid" &approleauthbackendrolesecretid.ApproleAuthBackendRoleSecretIdConfig { Connection: interface{}, diff --git a/docs/approleAuthBackendRoleSecretId.java.md b/docs/approleAuthBackendRoleSecretId.java.md index 3bc2ee94..83671342 100644 --- a/docs/approleAuthBackendRoleSecretId.java.md +++ b/docs/approleAuthBackendRoleSecretId.java.md @@ -220,6 +220,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -299,6 +300,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/approleAuthBackendRoleSecretId.python.md b/docs/approleAuthBackendRoleSecretId.python.md index 01c05c3e..925dd4f3 100644 --- a/docs/approleAuthBackendRoleSecretId.python.md +++ b/docs/approleAuthBackendRoleSecretId.python.md @@ -217,6 +217,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -301,6 +302,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/approleAuthBackendRoleSecretId.typescript.md b/docs/approleAuthBackendRoleSecretId.typescript.md index f91bbed3..d28169d7 100644 --- a/docs/approleAuthBackendRoleSecretId.typescript.md +++ b/docs/approleAuthBackendRoleSecretId.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -133,6 +134,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/audit.csharp.md b/docs/audit.csharp.md index ad76ec71..8a349f1b 100644 --- a/docs/audit.csharp.md +++ b/docs/audit.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/audit.go.md b/docs/audit.go.md index cbd152d1..3d29722c 100644 --- a/docs/audit.go.md +++ b/docs/audit.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/audit" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/audit" audit.NewAudit(scope Construct, id *string, config AuditConfig) Audit ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -406,7 +413,7 @@ func ResetPath() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/audit" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/audit" audit.Audit_IsConstruct(x interface{}) *bool ``` @@ -438,7 +445,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/audit" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/audit" audit.Audit_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +459,7 @@ audit.Audit_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/audit" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/audit" audit.Audit_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +473,7 @@ audit.Audit_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/audit" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/audit" audit.Audit_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -849,7 +856,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/audit" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/audit" &audit.AuditConfig { Connection: interface{}, diff --git a/docs/audit.java.md b/docs/audit.java.md index 48e652c9..1370d2a6 100644 --- a/docs/audit.java.md +++ b/docs/audit.java.md @@ -196,6 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -272,6 +273,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/audit.python.md b/docs/audit.python.md index 720c04b1..d04f299a 100644 --- a/docs/audit.python.md +++ b/docs/audit.python.md @@ -193,6 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -274,6 +275,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/audit.typescript.md b/docs/audit.typescript.md index 186ff84f..6ef0e3b5 100644 --- a/docs/audit.typescript.md +++ b/docs/audit.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/auditRequestHeader.csharp.md b/docs/auditRequestHeader.csharp.md index b9a45edc..bf0d0a91 100644 --- a/docs/auditRequestHeader.csharp.md +++ b/docs/auditRequestHeader.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/auditRequestHeader.go.md b/docs/auditRequestHeader.go.md index 7c0e3103..a41ff36c 100644 --- a/docs/auditRequestHeader.go.md +++ b/docs/auditRequestHeader.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/auditrequestheader" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/auditrequestheader" auditrequestheader.NewAuditRequestHeader(scope Construct, id *string, config AuditRequestHeaderConfig) AuditRequestHeader ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -392,7 +399,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/auditrequestheader" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/auditrequestheader" auditrequestheader.AuditRequestHeader_IsConstruct(x interface{}) *bool ``` @@ -424,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/auditrequestheader" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/auditrequestheader" auditrequestheader.AuditRequestHeader_IsTerraformElement(x interface{}) *bool ``` @@ -438,7 +445,7 @@ auditrequestheader.AuditRequestHeader_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/auditrequestheader" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/auditrequestheader" auditrequestheader.AuditRequestHeader_IsTerraformResource(x interface{}) *bool ``` @@ -452,7 +459,7 @@ auditrequestheader.AuditRequestHeader_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/auditrequestheader" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/auditrequestheader" auditrequestheader.AuditRequestHeader_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -769,7 +776,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/auditrequestheader" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/auditrequestheader" &auditrequestheader.AuditRequestHeaderConfig { Connection: interface{}, diff --git a/docs/auditRequestHeader.java.md b/docs/auditRequestHeader.java.md index a82e4de3..f71be20c 100644 --- a/docs/auditRequestHeader.java.md +++ b/docs/auditRequestHeader.java.md @@ -158,6 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -232,6 +233,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/auditRequestHeader.python.md b/docs/auditRequestHeader.python.md index a4a5436c..7d66086a 100644 --- a/docs/auditRequestHeader.python.md +++ b/docs/auditRequestHeader.python.md @@ -155,6 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -234,6 +235,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/auditRequestHeader.typescript.md b/docs/auditRequestHeader.typescript.md index 1625d88f..ad325bc6 100644 --- a/docs/auditRequestHeader.typescript.md +++ b/docs/auditRequestHeader.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/authBackend.csharp.md b/docs/authBackend.csharp.md index ad457aee..a6b4b5a3 100644 --- a/docs/authBackend.csharp.md +++ b/docs/authBackend.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -133,6 +134,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp @@ -1311,6 +1318,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1318,6 +1326,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp diff --git a/docs/authBackend.go.md b/docs/authBackend.go.md index 7742528a..d9e63cb7 100644 --- a/docs/authBackend.go.md +++ b/docs/authBackend.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/authbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/authbackend" authbackend.NewAuthBackend(scope Construct, id *string, config AuthBackendConfig) AuthBackend ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -133,6 +134,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -433,7 +440,7 @@ func ResetTune() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/authbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/authbackend" authbackend.AuthBackend_IsConstruct(x interface{}) *bool ``` @@ -465,7 +472,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/authbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/authbackend" authbackend.AuthBackend_IsTerraformElement(x interface{}) *bool ``` @@ -479,7 +486,7 @@ authbackend.AuthBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/authbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/authbackend" authbackend.AuthBackend_IsTerraformResource(x interface{}) *bool ``` @@ -493,7 +500,7 @@ authbackend.AuthBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/authbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/authbackend" authbackend.AuthBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -909,7 +916,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/authbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/authbackend" &authbackend.AuthBackendConfig { Connection: interface{}, @@ -1138,7 +1145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/authbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/authbackend" &authbackend.AuthBackendTune { AllowedResponseHeaders: *[]*string, @@ -1270,7 +1277,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/authbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/authbackend" authbackend.NewAuthBackendTuneList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) AuthBackendTuneList ``` @@ -1311,6 +1318,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1318,6 +1326,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -1413,7 +1437,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/authbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/authbackend" authbackend.NewAuthBackendTuneOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) AuthBackendTuneOutputReference ``` diff --git a/docs/authBackend.java.md b/docs/authBackend.java.md index 824aaa6f..a782d489 100644 --- a/docs/authBackend.java.md +++ b/docs/authBackend.java.md @@ -206,6 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -285,6 +286,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java @@ -1472,6 +1479,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -1479,6 +1487,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java diff --git a/docs/authBackend.python.md b/docs/authBackend.python.md index e05d4df4..8c087783 100644 --- a/docs/authBackend.python.md +++ b/docs/authBackend.python.md @@ -201,6 +201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -285,6 +286,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python @@ -1512,6 +1519,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -1519,6 +1527,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python diff --git a/docs/authBackend.typescript.md b/docs/authBackend.typescript.md index c4549d2f..43c71c1a 100644 --- a/docs/authBackend.typescript.md +++ b/docs/authBackend.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -133,6 +134,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript @@ -1286,6 +1293,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -1293,6 +1301,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript diff --git a/docs/awsAuthBackendCert.csharp.md b/docs/awsAuthBackendCert.csharp.md index bd818967..defbf4cc 100644 --- a/docs/awsAuthBackendCert.csharp.md +++ b/docs/awsAuthBackendCert.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/awsAuthBackendCert.go.md b/docs/awsAuthBackendCert.go.md index 5cf86980..37e8798c 100644 --- a/docs/awsAuthBackendCert.go.md +++ b/docs/awsAuthBackendCert.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendcert" awsauthbackendcert.NewAwsAuthBackendCert(scope Construct, id *string, config AwsAuthBackendCertConfig) AwsAuthBackendCert ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -399,7 +406,7 @@ func ResetType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendcert" awsauthbackendcert.AwsAuthBackendCert_IsConstruct(x interface{}) *bool ``` @@ -431,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendcert" awsauthbackendcert.AwsAuthBackendCert_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +452,7 @@ awsauthbackendcert.AwsAuthBackendCert_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendcert" awsauthbackendcert.AwsAuthBackendCert_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +466,7 @@ awsauthbackendcert.AwsAuthBackendCert_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendcert" awsauthbackendcert.AwsAuthBackendCert_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -820,7 +827,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendcert" &awsauthbackendcert.AwsAuthBackendCertConfig { Connection: interface{}, diff --git a/docs/awsAuthBackendCert.java.md b/docs/awsAuthBackendCert.java.md index 35dd5457..ff46c490 100644 --- a/docs/awsAuthBackendCert.java.md +++ b/docs/awsAuthBackendCert.java.md @@ -181,6 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -256,6 +257,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/awsAuthBackendCert.python.md b/docs/awsAuthBackendCert.python.md index 30ec37fa..19468077 100644 --- a/docs/awsAuthBackendCert.python.md +++ b/docs/awsAuthBackendCert.python.md @@ -179,6 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -259,6 +260,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/awsAuthBackendCert.typescript.md b/docs/awsAuthBackendCert.typescript.md index 88e2670e..d209d726 100644 --- a/docs/awsAuthBackendCert.typescript.md +++ b/docs/awsAuthBackendCert.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/awsAuthBackendClient.csharp.md b/docs/awsAuthBackendClient.csharp.md index c7d7c736..7f38cf4b 100644 --- a/docs/awsAuthBackendClient.csharp.md +++ b/docs/awsAuthBackendClient.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -136,6 +137,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/awsAuthBackendClient.go.md b/docs/awsAuthBackendClient.go.md index feae9782..457cb701 100644 --- a/docs/awsAuthBackendClient.go.md +++ b/docs/awsAuthBackendClient.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendclient" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendclient" awsauthbackendclient.NewAwsAuthBackendClient(scope Construct, id *string, config AwsAuthBackendClientConfig) AwsAuthBackendClient ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -136,6 +137,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -448,7 +455,7 @@ func ResetUseStsRegionFromClient() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendclient" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendclient" awsauthbackendclient.AwsAuthBackendClient_IsConstruct(x interface{}) *bool ``` @@ -480,7 +487,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendclient" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendclient" awsauthbackendclient.AwsAuthBackendClient_IsTerraformElement(x interface{}) *bool ``` @@ -494,7 +501,7 @@ awsauthbackendclient.AwsAuthBackendClient_IsTerraformElement(x interface{}) *boo ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendclient" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendclient" awsauthbackendclient.AwsAuthBackendClient_IsTerraformResource(x interface{}) *bool ``` @@ -508,7 +515,7 @@ awsauthbackendclient.AwsAuthBackendClient_IsTerraformResource(x interface{}) *bo ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendclient" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendclient" awsauthbackendclient.AwsAuthBackendClient_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -979,7 +986,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendclient" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendclient" &awsauthbackendclient.AwsAuthBackendClientConfig { Connection: interface{}, diff --git a/docs/awsAuthBackendClient.java.md b/docs/awsAuthBackendClient.java.md index 4e1f332d..0a154d08 100644 --- a/docs/awsAuthBackendClient.java.md +++ b/docs/awsAuthBackendClient.java.md @@ -242,6 +242,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -324,6 +325,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/awsAuthBackendClient.python.md b/docs/awsAuthBackendClient.python.md index 959156ca..51e4470e 100644 --- a/docs/awsAuthBackendClient.python.md +++ b/docs/awsAuthBackendClient.python.md @@ -239,6 +239,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -326,6 +327,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/awsAuthBackendClient.typescript.md b/docs/awsAuthBackendClient.typescript.md index 0f135589..559a424d 100644 --- a/docs/awsAuthBackendClient.typescript.md +++ b/docs/awsAuthBackendClient.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -136,6 +137,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/awsAuthBackendConfigIdentity.csharp.md b/docs/awsAuthBackendConfigIdentity.csharp.md index 0b01122b..bb71b177 100644 --- a/docs/awsAuthBackendConfigIdentity.csharp.md +++ b/docs/awsAuthBackendConfigIdentity.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -132,6 +133,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/awsAuthBackendConfigIdentity.go.md b/docs/awsAuthBackendConfigIdentity.go.md index df4de74e..85c8b929 100644 --- a/docs/awsAuthBackendConfigIdentity.go.md +++ b/docs/awsAuthBackendConfigIdentity.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendconfigidentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendconfigidentity" awsauthbackendconfigidentity.NewAwsAuthBackendConfigIdentity(scope Construct, id *string, config AwsAuthBackendConfigIdentityConfig) AwsAuthBackendConfigIdentity ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -132,6 +133,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -420,7 +427,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendconfigidentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendconfigidentity" awsauthbackendconfigidentity.AwsAuthBackendConfigIdentity_IsConstruct(x interface{}) *bool ``` @@ -452,7 +459,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendconfigidentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendconfigidentity" awsauthbackendconfigidentity.AwsAuthBackendConfigIdentity_IsTerraformElement(x interface{}) *bool ``` @@ -466,7 +473,7 @@ awsauthbackendconfigidentity.AwsAuthBackendConfigIdentity_IsTerraformElement(x i ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendconfigidentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendconfigidentity" awsauthbackendconfigidentity.AwsAuthBackendConfigIdentity_IsTerraformResource(x interface{}) *bool ``` @@ -480,7 +487,7 @@ awsauthbackendconfigidentity.AwsAuthBackendConfigIdentity_IsTerraformResource(x ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendconfigidentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendconfigidentity" awsauthbackendconfigidentity.AwsAuthBackendConfigIdentity_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -863,7 +870,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendconfigidentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendconfigidentity" &awsauthbackendconfigidentity.AwsAuthBackendConfigIdentityConfig { Connection: interface{}, diff --git a/docs/awsAuthBackendConfigIdentity.java.md b/docs/awsAuthBackendConfigIdentity.java.md index 33703952..86cd5e5f 100644 --- a/docs/awsAuthBackendConfigIdentity.java.md +++ b/docs/awsAuthBackendConfigIdentity.java.md @@ -193,6 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -271,6 +272,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/awsAuthBackendConfigIdentity.python.md b/docs/awsAuthBackendConfigIdentity.python.md index b5f30df5..67afc40e 100644 --- a/docs/awsAuthBackendConfigIdentity.python.md +++ b/docs/awsAuthBackendConfigIdentity.python.md @@ -191,6 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -274,6 +275,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/awsAuthBackendConfigIdentity.typescript.md b/docs/awsAuthBackendConfigIdentity.typescript.md index 8044dfbb..d511ead7 100644 --- a/docs/awsAuthBackendConfigIdentity.typescript.md +++ b/docs/awsAuthBackendConfigIdentity.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -132,6 +133,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/awsAuthBackendIdentityWhitelist.csharp.md b/docs/awsAuthBackendIdentityWhitelist.csharp.md index ac8e2ef0..bcdca192 100644 --- a/docs/awsAuthBackendIdentityWhitelist.csharp.md +++ b/docs/awsAuthBackendIdentityWhitelist.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/awsAuthBackendIdentityWhitelist.go.md b/docs/awsAuthBackendIdentityWhitelist.go.md index e41c3543..d5f52290 100644 --- a/docs/awsAuthBackendIdentityWhitelist.go.md +++ b/docs/awsAuthBackendIdentityWhitelist.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendidentitywhitelist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendidentitywhitelist" awsauthbackendidentitywhitelist.NewAwsAuthBackendIdentityWhitelist(scope Construct, id *string, config AwsAuthBackendIdentityWhitelistConfig) AwsAuthBackendIdentityWhitelist ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -406,7 +413,7 @@ func ResetSafetyBuffer() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendidentitywhitelist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendidentitywhitelist" awsauthbackendidentitywhitelist.AwsAuthBackendIdentityWhitelist_IsConstruct(x interface{}) *bool ``` @@ -438,7 +445,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendidentitywhitelist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendidentitywhitelist" awsauthbackendidentitywhitelist.AwsAuthBackendIdentityWhitelist_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +459,7 @@ awsauthbackendidentitywhitelist.AwsAuthBackendIdentityWhitelist_IsTerraformEleme ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendidentitywhitelist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendidentitywhitelist" awsauthbackendidentitywhitelist.AwsAuthBackendIdentityWhitelist_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +473,7 @@ awsauthbackendidentitywhitelist.AwsAuthBackendIdentityWhitelist_IsTerraformResou ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendidentitywhitelist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendidentitywhitelist" awsauthbackendidentitywhitelist.AwsAuthBackendIdentityWhitelist_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -805,7 +812,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendidentitywhitelist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendidentitywhitelist" &awsauthbackendidentitywhitelist.AwsAuthBackendIdentityWhitelistConfig { Connection: interface{}, diff --git a/docs/awsAuthBackendIdentityWhitelist.java.md b/docs/awsAuthBackendIdentityWhitelist.java.md index 103e847e..057f1783 100644 --- a/docs/awsAuthBackendIdentityWhitelist.java.md +++ b/docs/awsAuthBackendIdentityWhitelist.java.md @@ -170,6 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -246,6 +247,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/awsAuthBackendIdentityWhitelist.python.md b/docs/awsAuthBackendIdentityWhitelist.python.md index 44f0937a..0d40d775 100644 --- a/docs/awsAuthBackendIdentityWhitelist.python.md +++ b/docs/awsAuthBackendIdentityWhitelist.python.md @@ -167,6 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -248,6 +249,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/awsAuthBackendIdentityWhitelist.typescript.md b/docs/awsAuthBackendIdentityWhitelist.typescript.md index 3626bc06..feb7f1c8 100644 --- a/docs/awsAuthBackendIdentityWhitelist.typescript.md +++ b/docs/awsAuthBackendIdentityWhitelist.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/awsAuthBackendLogin.csharp.md b/docs/awsAuthBackendLogin.csharp.md index 38f6eaa6..786b0f22 100644 --- a/docs/awsAuthBackendLogin.csharp.md +++ b/docs/awsAuthBackendLogin.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -137,6 +138,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/awsAuthBackendLogin.go.md b/docs/awsAuthBackendLogin.go.md index 4b1da813..818b8f77 100644 --- a/docs/awsAuthBackendLogin.go.md +++ b/docs/awsAuthBackendLogin.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendlogin" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendlogin" awsauthbackendlogin.NewAwsAuthBackendLogin(scope Construct, id *string, config AwsAuthBackendLoginConfig) AwsAuthBackendLogin ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -137,6 +138,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -455,7 +462,7 @@ func ResetSignature() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendlogin" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendlogin" awsauthbackendlogin.AwsAuthBackendLogin_IsConstruct(x interface{}) *bool ``` @@ -487,7 +494,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendlogin" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendlogin" awsauthbackendlogin.AwsAuthBackendLogin_IsTerraformElement(x interface{}) *bool ``` @@ -501,7 +508,7 @@ awsauthbackendlogin.AwsAuthBackendLogin_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendlogin" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendlogin" awsauthbackendlogin.AwsAuthBackendLogin_IsTerraformResource(x interface{}) *bool ``` @@ -515,7 +522,7 @@ awsauthbackendlogin.AwsAuthBackendLogin_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendlogin" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendlogin" awsauthbackendlogin.AwsAuthBackendLogin_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1096,7 +1103,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendlogin" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendlogin" &awsauthbackendlogin.AwsAuthBackendLoginConfig { Connection: interface{}, diff --git a/docs/awsAuthBackendLogin.java.md b/docs/awsAuthBackendLogin.java.md index 7e667791..3faaa96a 100644 --- a/docs/awsAuthBackendLogin.java.md +++ b/docs/awsAuthBackendLogin.java.md @@ -253,6 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -336,6 +337,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/awsAuthBackendLogin.python.md b/docs/awsAuthBackendLogin.python.md index 57cbca6a..fe570bb7 100644 --- a/docs/awsAuthBackendLogin.python.md +++ b/docs/awsAuthBackendLogin.python.md @@ -251,6 +251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -339,6 +340,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/awsAuthBackendLogin.typescript.md b/docs/awsAuthBackendLogin.typescript.md index a33599d8..2a4fbc14 100644 --- a/docs/awsAuthBackendLogin.typescript.md +++ b/docs/awsAuthBackendLogin.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -137,6 +138,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/awsAuthBackendRole.csharp.md b/docs/awsAuthBackendRole.csharp.md index 9b26a326..ffe68b90 100644 --- a/docs/awsAuthBackendRole.csharp.md +++ b/docs/awsAuthBackendRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -153,6 +154,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/awsAuthBackendRole.go.md b/docs/awsAuthBackendRole.go.md index 79e9fc96..1e8b20c3 100644 --- a/docs/awsAuthBackendRole.go.md +++ b/docs/awsAuthBackendRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendrole" awsauthbackendrole.NewAwsAuthBackendRole(scope Construct, id *string, config AwsAuthBackendRoleConfig) AwsAuthBackendRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -153,6 +154,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -567,7 +574,7 @@ func ResetTokenType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendrole" awsauthbackendrole.AwsAuthBackendRole_IsConstruct(x interface{}) *bool ``` @@ -599,7 +606,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendrole" awsauthbackendrole.AwsAuthBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -613,7 +620,7 @@ awsauthbackendrole.AwsAuthBackendRole_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendrole" awsauthbackendrole.AwsAuthBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -627,7 +634,7 @@ awsauthbackendrole.AwsAuthBackendRole_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendrole" awsauthbackendrole.AwsAuthBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1505,7 +1512,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendrole" &awsauthbackendrole.AwsAuthBackendRoleConfig { Connection: interface{}, diff --git a/docs/awsAuthBackendRole.java.md b/docs/awsAuthBackendRole.java.md index 1fdfcd70..86c415e1 100644 --- a/docs/awsAuthBackendRole.java.md +++ b/docs/awsAuthBackendRole.java.md @@ -463,6 +463,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -562,6 +563,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/awsAuthBackendRole.python.md b/docs/awsAuthBackendRole.python.md index 5ee3c5a7..a1495819 100644 --- a/docs/awsAuthBackendRole.python.md +++ b/docs/awsAuthBackendRole.python.md @@ -457,6 +457,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -561,6 +562,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/awsAuthBackendRole.typescript.md b/docs/awsAuthBackendRole.typescript.md index b9369ae0..b951f5fc 100644 --- a/docs/awsAuthBackendRole.typescript.md +++ b/docs/awsAuthBackendRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -153,6 +154,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/awsAuthBackendRoleTag.csharp.md b/docs/awsAuthBackendRoleTag.csharp.md index c21a3274..baed978d 100644 --- a/docs/awsAuthBackendRoleTag.csharp.md +++ b/docs/awsAuthBackendRoleTag.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -133,6 +134,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/awsAuthBackendRoleTag.go.md b/docs/awsAuthBackendRoleTag.go.md index 9b7c654d..c0f8124a 100644 --- a/docs/awsAuthBackendRoleTag.go.md +++ b/docs/awsAuthBackendRoleTag.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendroletag" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendroletag" awsauthbackendroletag.NewAwsAuthBackendRoleTag(scope Construct, id *string, config AwsAuthBackendRoleTagConfig) AwsAuthBackendRoleTag ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -133,6 +134,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -427,7 +434,7 @@ func ResetPolicies() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendroletag" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendroletag" awsauthbackendroletag.AwsAuthBackendRoleTag_IsConstruct(x interface{}) *bool ``` @@ -459,7 +466,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendroletag" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendroletag" awsauthbackendroletag.AwsAuthBackendRoleTag_IsTerraformElement(x interface{}) *bool ``` @@ -473,7 +480,7 @@ awsauthbackendroletag.AwsAuthBackendRoleTag_IsTerraformElement(x interface{}) *b ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendroletag" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendroletag" awsauthbackendroletag.AwsAuthBackendRoleTag_IsTerraformResource(x interface{}) *bool ``` @@ -487,7 +494,7 @@ awsauthbackendroletag.AwsAuthBackendRoleTag_IsTerraformResource(x interface{}) * ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendroletag" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendroletag" awsauthbackendroletag.AwsAuthBackendRoleTag_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -936,7 +943,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendroletag" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendroletag" &awsauthbackendroletag.AwsAuthBackendRoleTagConfig { Connection: interface{}, diff --git a/docs/awsAuthBackendRoleTag.java.md b/docs/awsAuthBackendRoleTag.java.md index 17d090b0..58a0772d 100644 --- a/docs/awsAuthBackendRoleTag.java.md +++ b/docs/awsAuthBackendRoleTag.java.md @@ -221,6 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -300,6 +301,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/awsAuthBackendRoleTag.python.md b/docs/awsAuthBackendRoleTag.python.md index 5f63cac2..c722e5ae 100644 --- a/docs/awsAuthBackendRoleTag.python.md +++ b/docs/awsAuthBackendRoleTag.python.md @@ -217,6 +217,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -301,6 +302,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/awsAuthBackendRoleTag.typescript.md b/docs/awsAuthBackendRoleTag.typescript.md index 2b4cd2f2..bde01c47 100644 --- a/docs/awsAuthBackendRoleTag.typescript.md +++ b/docs/awsAuthBackendRoleTag.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -133,6 +134,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/awsAuthBackendRoletagBlacklist.csharp.md b/docs/awsAuthBackendRoletagBlacklist.csharp.md index d9adfa25..6d8250e7 100644 --- a/docs/awsAuthBackendRoletagBlacklist.csharp.md +++ b/docs/awsAuthBackendRoletagBlacklist.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/awsAuthBackendRoletagBlacklist.go.md b/docs/awsAuthBackendRoletagBlacklist.go.md index 1ea8f694..d23e3fd5 100644 --- a/docs/awsAuthBackendRoletagBlacklist.go.md +++ b/docs/awsAuthBackendRoletagBlacklist.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendroletagblacklist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendroletagblacklist" awsauthbackendroletagblacklist.NewAwsAuthBackendRoletagBlacklist(scope Construct, id *string, config AwsAuthBackendRoletagBlacklistConfig) AwsAuthBackendRoletagBlacklist ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -399,7 +406,7 @@ func ResetSafetyBuffer() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendroletagblacklist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendroletagblacklist" awsauthbackendroletagblacklist.AwsAuthBackendRoletagBlacklist_IsConstruct(x interface{}) *bool ``` @@ -431,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendroletagblacklist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendroletagblacklist" awsauthbackendroletagblacklist.AwsAuthBackendRoletagBlacklist_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +452,7 @@ awsauthbackendroletagblacklist.AwsAuthBackendRoletagBlacklist_IsTerraformElement ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendroletagblacklist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendroletagblacklist" awsauthbackendroletagblacklist.AwsAuthBackendRoletagBlacklist_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +466,7 @@ awsauthbackendroletagblacklist.AwsAuthBackendRoletagBlacklist_IsTerraformResourc ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendroletagblacklist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendroletagblacklist" awsauthbackendroletagblacklist.AwsAuthBackendRoletagBlacklist_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -798,7 +805,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendroletagblacklist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendroletagblacklist" &awsauthbackendroletagblacklist.AwsAuthBackendRoletagBlacklistConfig { Connection: interface{}, diff --git a/docs/awsAuthBackendRoletagBlacklist.java.md b/docs/awsAuthBackendRoletagBlacklist.java.md index c36ddc84..0a91eeef 100644 --- a/docs/awsAuthBackendRoletagBlacklist.java.md +++ b/docs/awsAuthBackendRoletagBlacklist.java.md @@ -170,6 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -245,6 +246,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/awsAuthBackendRoletagBlacklist.python.md b/docs/awsAuthBackendRoletagBlacklist.python.md index a8703152..c7a101b0 100644 --- a/docs/awsAuthBackendRoletagBlacklist.python.md +++ b/docs/awsAuthBackendRoletagBlacklist.python.md @@ -167,6 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -247,6 +248,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/awsAuthBackendRoletagBlacklist.typescript.md b/docs/awsAuthBackendRoletagBlacklist.typescript.md index b4a44eda..2a619272 100644 --- a/docs/awsAuthBackendRoletagBlacklist.typescript.md +++ b/docs/awsAuthBackendRoletagBlacklist.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/awsAuthBackendStsRole.csharp.md b/docs/awsAuthBackendStsRole.csharp.md index cd3dfa42..27e61f29 100644 --- a/docs/awsAuthBackendStsRole.csharp.md +++ b/docs/awsAuthBackendStsRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/awsAuthBackendStsRole.go.md b/docs/awsAuthBackendStsRole.go.md index 2dbd12dc..1b5e7864 100644 --- a/docs/awsAuthBackendStsRole.go.md +++ b/docs/awsAuthBackendStsRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendstsrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendstsrole" awsauthbackendstsrole.NewAwsAuthBackendStsRole(scope Construct, id *string, config AwsAuthBackendStsRoleConfig) AwsAuthBackendStsRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -392,7 +399,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendstsrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendstsrole" awsauthbackendstsrole.AwsAuthBackendStsRole_IsConstruct(x interface{}) *bool ``` @@ -424,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendstsrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendstsrole" awsauthbackendstsrole.AwsAuthBackendStsRole_IsTerraformElement(x interface{}) *bool ``` @@ -438,7 +445,7 @@ awsauthbackendstsrole.AwsAuthBackendStsRole_IsTerraformElement(x interface{}) *b ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendstsrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendstsrole" awsauthbackendstsrole.AwsAuthBackendStsRole_IsTerraformResource(x interface{}) *bool ``` @@ -452,7 +459,7 @@ awsauthbackendstsrole.AwsAuthBackendStsRole_IsTerraformResource(x interface{}) * ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendstsrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendstsrole" awsauthbackendstsrole.AwsAuthBackendStsRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -791,7 +798,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awsauthbackendstsrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendstsrole" &awsauthbackendstsrole.AwsAuthBackendStsRoleConfig { Connection: interface{}, diff --git a/docs/awsAuthBackendStsRole.java.md b/docs/awsAuthBackendStsRole.java.md index a4f4c458..1da06749 100644 --- a/docs/awsAuthBackendStsRole.java.md +++ b/docs/awsAuthBackendStsRole.java.md @@ -169,6 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -243,6 +244,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/awsAuthBackendStsRole.python.md b/docs/awsAuthBackendStsRole.python.md index 952614c0..505e287d 100644 --- a/docs/awsAuthBackendStsRole.python.md +++ b/docs/awsAuthBackendStsRole.python.md @@ -167,6 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -246,6 +247,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/awsAuthBackendStsRole.typescript.md b/docs/awsAuthBackendStsRole.typescript.md index 44e724c4..1113644c 100644 --- a/docs/awsAuthBackendStsRole.typescript.md +++ b/docs/awsAuthBackendStsRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/awsSecretBackend.csharp.md b/docs/awsSecretBackend.csharp.md index 204378f8..d8a3dae1 100644 --- a/docs/awsSecretBackend.csharp.md +++ b/docs/awsSecretBackend.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -139,6 +140,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/awsSecretBackend.go.md b/docs/awsSecretBackend.go.md index 591195ca..01560058 100644 --- a/docs/awsSecretBackend.go.md +++ b/docs/awsSecretBackend.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awssecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackend" awssecretbackend.NewAwsSecretBackend(scope Construct, id *string, config AwsSecretBackendConfig) AwsSecretBackend ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -139,6 +140,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -469,7 +476,7 @@ func ResetUsernameTemplate() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awssecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackend" awssecretbackend.AwsSecretBackend_IsConstruct(x interface{}) *bool ``` @@ -501,7 +508,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awssecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackend" awssecretbackend.AwsSecretBackend_IsTerraformElement(x interface{}) *bool ``` @@ -515,7 +522,7 @@ awssecretbackend.AwsSecretBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awssecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackend" awssecretbackend.AwsSecretBackend_IsTerraformResource(x interface{}) *bool ``` @@ -529,7 +536,7 @@ awssecretbackend.AwsSecretBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awssecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackend" awssecretbackend.AwsSecretBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1066,7 +1073,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awssecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackend" &awssecretbackend.AwsSecretBackendConfig { Connection: interface{}, diff --git a/docs/awsSecretBackend.java.md b/docs/awsSecretBackend.java.md index fdb53b44..f9bf7678 100644 --- a/docs/awsSecretBackend.java.md +++ b/docs/awsSecretBackend.java.md @@ -279,6 +279,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -364,6 +365,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/awsSecretBackend.python.md b/docs/awsSecretBackend.python.md index a451749d..11af2efa 100644 --- a/docs/awsSecretBackend.python.md +++ b/docs/awsSecretBackend.python.md @@ -275,6 +275,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -365,6 +366,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/awsSecretBackend.typescript.md b/docs/awsSecretBackend.typescript.md index 7d4c80a4..f894136f 100644 --- a/docs/awsSecretBackend.typescript.md +++ b/docs/awsSecretBackend.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -139,6 +140,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/awsSecretBackendRole.csharp.md b/docs/awsSecretBackendRole.csharp.md index e2995389..6022f45f 100644 --- a/docs/awsSecretBackendRole.csharp.md +++ b/docs/awsSecretBackendRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -135,6 +136,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/awsSecretBackendRole.go.md b/docs/awsSecretBackendRole.go.md index 79a4fa24..9f53f796 100644 --- a/docs/awsSecretBackendRole.go.md +++ b/docs/awsSecretBackendRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awssecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackendrole" awssecretbackendrole.NewAwsSecretBackendRole(scope Construct, id *string, config AwsSecretBackendRoleConfig) AwsSecretBackendRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -135,6 +136,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -441,7 +448,7 @@ func ResetUserPath() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awssecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackendrole" awssecretbackendrole.AwsSecretBackendRole_IsConstruct(x interface{}) *bool ``` @@ -473,7 +480,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awssecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackendrole" awssecretbackendrole.AwsSecretBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -487,7 +494,7 @@ awssecretbackendrole.AwsSecretBackendRole_IsTerraformElement(x interface{}) *boo ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awssecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackendrole" awssecretbackendrole.AwsSecretBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -501,7 +508,7 @@ awssecretbackendrole.AwsSecretBackendRole_IsTerraformResource(x interface{}) *bo ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awssecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackendrole" awssecretbackendrole.AwsSecretBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1016,7 +1023,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awssecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackendrole" &awssecretbackendrole.AwsSecretBackendRoleConfig { Connection: interface{}, diff --git a/docs/awsSecretBackendRole.java.md b/docs/awsSecretBackendRole.java.md index dd34dac0..42d8958e 100644 --- a/docs/awsSecretBackendRole.java.md +++ b/docs/awsSecretBackendRole.java.md @@ -273,6 +273,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -354,6 +355,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/awsSecretBackendRole.python.md b/docs/awsSecretBackendRole.python.md index d27d55af..1d6fae2d 100644 --- a/docs/awsSecretBackendRole.python.md +++ b/docs/awsSecretBackendRole.python.md @@ -271,6 +271,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -357,6 +358,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/awsSecretBackendRole.typescript.md b/docs/awsSecretBackendRole.typescript.md index 02f8cdda..775da24c 100644 --- a/docs/awsSecretBackendRole.typescript.md +++ b/docs/awsSecretBackendRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -135,6 +136,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/awsSecretBackendStaticRole.csharp.md b/docs/awsSecretBackendStaticRole.csharp.md index 5edb4f23..415d22f5 100644 --- a/docs/awsSecretBackendStaticRole.csharp.md +++ b/docs/awsSecretBackendStaticRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/awsSecretBackendStaticRole.go.md b/docs/awsSecretBackendStaticRole.go.md index 62e26042..2ae2c659 100644 --- a/docs/awsSecretBackendStaticRole.go.md +++ b/docs/awsSecretBackendStaticRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awssecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackendstaticrole" awssecretbackendstaticrole.NewAwsSecretBackendStaticRole(scope Construct, id *string, config AwsSecretBackendStaticRoleConfig) AwsSecretBackendStaticRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -392,7 +399,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awssecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackendstaticrole" awssecretbackendstaticrole.AwsSecretBackendStaticRole_IsConstruct(x interface{}) *bool ``` @@ -424,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awssecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackendstaticrole" awssecretbackendstaticrole.AwsSecretBackendStaticRole_IsTerraformElement(x interface{}) *bool ``` @@ -438,7 +445,7 @@ awssecretbackendstaticrole.AwsSecretBackendStaticRole_IsTerraformElement(x inter ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awssecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackendstaticrole" awssecretbackendstaticrole.AwsSecretBackendStaticRole_IsTerraformResource(x interface{}) *bool ``` @@ -452,7 +459,7 @@ awssecretbackendstaticrole.AwsSecretBackendStaticRole_IsTerraformResource(x inte ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awssecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackendstaticrole" awssecretbackendstaticrole.AwsSecretBackendStaticRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -813,7 +820,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/awssecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackendstaticrole" &awssecretbackendstaticrole.AwsSecretBackendStaticRoleConfig { Connection: interface{}, diff --git a/docs/awsSecretBackendStaticRole.java.md b/docs/awsSecretBackendStaticRole.java.md index 6641c738..04ba92e9 100644 --- a/docs/awsSecretBackendStaticRole.java.md +++ b/docs/awsSecretBackendStaticRole.java.md @@ -181,6 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -255,6 +256,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/awsSecretBackendStaticRole.python.md b/docs/awsSecretBackendStaticRole.python.md index c2160699..e6b30275 100644 --- a/docs/awsSecretBackendStaticRole.python.md +++ b/docs/awsSecretBackendStaticRole.python.md @@ -179,6 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -258,6 +259,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/awsSecretBackendStaticRole.typescript.md b/docs/awsSecretBackendStaticRole.typescript.md index fabff934..97f3073b 100644 --- a/docs/awsSecretBackendStaticRole.typescript.md +++ b/docs/awsSecretBackendStaticRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/azureAuthBackendConfig.csharp.md b/docs/azureAuthBackendConfig.csharp.md index 48cb2685..b7afab58 100644 --- a/docs/azureAuthBackendConfig.csharp.md +++ b/docs/azureAuthBackendConfig.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/azureAuthBackendConfig.go.md b/docs/azureAuthBackendConfig.go.md index 2ca4eefb..396baa38 100644 --- a/docs/azureAuthBackendConfig.go.md +++ b/docs/azureAuthBackendConfig.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azureauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azureauthbackendconfig" azureauthbackendconfig.NewAzureAuthBackendConfig(scope Construct, id *string, config AzureAuthBackendConfigConfig) AzureAuthBackendConfig ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -413,7 +420,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azureauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azureauthbackendconfig" azureauthbackendconfig.AzureAuthBackendConfig_IsConstruct(x interface{}) *bool ``` @@ -445,7 +452,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azureauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azureauthbackendconfig" azureauthbackendconfig.AzureAuthBackendConfig_IsTerraformElement(x interface{}) *bool ``` @@ -459,7 +466,7 @@ azureauthbackendconfig.AzureAuthBackendConfig_IsTerraformElement(x interface{}) ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azureauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azureauthbackendconfig" azureauthbackendconfig.AzureAuthBackendConfig_IsTerraformResource(x interface{}) *bool ``` @@ -473,7 +480,7 @@ azureauthbackendconfig.AzureAuthBackendConfig_IsTerraformResource(x interface{}) ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azureauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azureauthbackendconfig" azureauthbackendconfig.AzureAuthBackendConfig_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -878,7 +885,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azureauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azureauthbackendconfig" &azureauthbackendconfig.AzureAuthBackendConfigConfig { Connection: interface{}, diff --git a/docs/azureAuthBackendConfig.java.md b/docs/azureAuthBackendConfig.java.md index d0cf0d37..4793c297 100644 --- a/docs/azureAuthBackendConfig.java.md +++ b/docs/azureAuthBackendConfig.java.md @@ -205,6 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -282,6 +283,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/azureAuthBackendConfig.python.md b/docs/azureAuthBackendConfig.python.md index 3943e33f..411f57e0 100644 --- a/docs/azureAuthBackendConfig.python.md +++ b/docs/azureAuthBackendConfig.python.md @@ -203,6 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -285,6 +286,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/azureAuthBackendConfig.typescript.md b/docs/azureAuthBackendConfig.typescript.md index c1d9d0ed..e0af3d64 100644 --- a/docs/azureAuthBackendConfig.typescript.md +++ b/docs/azureAuthBackendConfig.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/azureAuthBackendRole.csharp.md b/docs/azureAuthBackendRole.csharp.md index 8d019b6a..9fc5f54c 100644 --- a/docs/azureAuthBackendRole.csharp.md +++ b/docs/azureAuthBackendRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -143,6 +144,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/azureAuthBackendRole.go.md b/docs/azureAuthBackendRole.go.md index e92c2c27..7eb1ed00 100644 --- a/docs/azureAuthBackendRole.go.md +++ b/docs/azureAuthBackendRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azureauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azureauthbackendrole" azureauthbackendrole.NewAzureAuthBackendRole(scope Construct, id *string, config AzureAuthBackendRoleConfig) AzureAuthBackendRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -143,6 +144,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -497,7 +504,7 @@ func ResetTokenType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azureauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azureauthbackendrole" azureauthbackendrole.AzureAuthBackendRole_IsConstruct(x interface{}) *bool ``` @@ -529,7 +536,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azureauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azureauthbackendrole" azureauthbackendrole.AzureAuthBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -543,7 +550,7 @@ azureauthbackendrole.AzureAuthBackendRole_IsTerraformElement(x interface{}) *boo ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azureauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azureauthbackendrole" azureauthbackendrole.AzureAuthBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -557,7 +564,7 @@ azureauthbackendrole.AzureAuthBackendRole_IsTerraformResource(x interface{}) *bo ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azureauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azureauthbackendrole" azureauthbackendrole.AzureAuthBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1204,7 +1211,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azureauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azureauthbackendrole" &azureauthbackendrole.AzureAuthBackendRoleConfig { Connection: interface{}, diff --git a/docs/azureAuthBackendRole.java.md b/docs/azureAuthBackendRole.java.md index bb2c45a4..772d9d4b 100644 --- a/docs/azureAuthBackendRole.java.md +++ b/docs/azureAuthBackendRole.java.md @@ -338,6 +338,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -427,6 +428,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/azureAuthBackendRole.python.md b/docs/azureAuthBackendRole.python.md index df64a455..62827fb9 100644 --- a/docs/azureAuthBackendRole.python.md +++ b/docs/azureAuthBackendRole.python.md @@ -335,6 +335,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -429,6 +430,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/azureAuthBackendRole.typescript.md b/docs/azureAuthBackendRole.typescript.md index 4c540a57..dee01c05 100644 --- a/docs/azureAuthBackendRole.typescript.md +++ b/docs/azureAuthBackendRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -143,6 +144,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/azureSecretBackend.csharp.md b/docs/azureSecretBackend.csharp.md index 72cc2cce..48c32da8 100644 --- a/docs/azureSecretBackend.csharp.md +++ b/docs/azureSecretBackend.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -134,6 +135,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/azureSecretBackend.go.md b/docs/azureSecretBackend.go.md index 2851e545..3a854602 100644 --- a/docs/azureSecretBackend.go.md +++ b/docs/azureSecretBackend.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azuresecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackend" azuresecretbackend.NewAzureSecretBackend(scope Construct, id *string, config AzureSecretBackendConfig) AzureSecretBackend ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -134,6 +135,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -434,7 +441,7 @@ func ResetUseMicrosoftGraphApi() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azuresecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackend" azuresecretbackend.AzureSecretBackend_IsConstruct(x interface{}) *bool ``` @@ -466,7 +473,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azuresecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackend" azuresecretbackend.AzureSecretBackend_IsTerraformElement(x interface{}) *bool ``` @@ -480,7 +487,7 @@ azuresecretbackend.AzureSecretBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azuresecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackend" azuresecretbackend.AzureSecretBackend_IsTerraformResource(x interface{}) *bool ``` @@ -494,7 +501,7 @@ azuresecretbackend.AzureSecretBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azuresecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackend" azuresecretbackend.AzureSecretBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -965,7 +972,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azuresecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackend" &azuresecretbackend.AzureSecretBackendConfig { Connection: interface{}, diff --git a/docs/azureSecretBackend.java.md b/docs/azureSecretBackend.java.md index 7265c802..7bcb4211 100644 --- a/docs/azureSecretBackend.java.md +++ b/docs/azureSecretBackend.java.md @@ -243,6 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -323,6 +324,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/azureSecretBackend.python.md b/docs/azureSecretBackend.python.md index 044bd5da..5970b8ad 100644 --- a/docs/azureSecretBackend.python.md +++ b/docs/azureSecretBackend.python.md @@ -239,6 +239,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -324,6 +325,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/azureSecretBackend.typescript.md b/docs/azureSecretBackend.typescript.md index eb0a3014..18b56062 100644 --- a/docs/azureSecretBackend.typescript.md +++ b/docs/azureSecretBackend.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -134,6 +135,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/azureSecretBackendRole.csharp.md b/docs/azureSecretBackendRole.csharp.md index 492b6740..ec9cec6b 100644 --- a/docs/azureSecretBackendRole.csharp.md +++ b/docs/azureSecretBackendRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -137,6 +138,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp @@ -1412,6 +1419,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1419,6 +1427,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp @@ -1855,6 +1879,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1862,6 +1887,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp diff --git a/docs/azureSecretBackendRole.go.md b/docs/azureSecretBackendRole.go.md index 794bd6d5..a6aa0452 100644 --- a/docs/azureSecretBackendRole.go.md +++ b/docs/azureSecretBackendRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azuresecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackendrole" azuresecretbackendrole.NewAzureSecretBackendRole(scope Construct, id *string, config AzureSecretBackendRoleConfig) AzureSecretBackendRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -137,6 +138,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -467,7 +474,7 @@ func ResetTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azuresecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackendrole" azuresecretbackendrole.AzureSecretBackendRole_IsConstruct(x interface{}) *bool ``` @@ -499,7 +506,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azuresecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackendrole" azuresecretbackendrole.AzureSecretBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -513,7 +520,7 @@ azuresecretbackendrole.AzureSecretBackendRole_IsTerraformElement(x interface{}) ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azuresecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackendrole" azuresecretbackendrole.AzureSecretBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -527,7 +534,7 @@ azuresecretbackendrole.AzureSecretBackendRole_IsTerraformResource(x interface{}) ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azuresecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackendrole" azuresecretbackendrole.AzureSecretBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -998,7 +1005,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azuresecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackendrole" &azuresecretbackendrole.AzureSecretBackendRoleAzureGroups { GroupName: *string, @@ -1030,7 +1037,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azuresecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackendrole" &azuresecretbackendrole.AzureSecretBackendRoleAzureRoles { Scope: *string, @@ -1090,7 +1097,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azuresecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackendrole" &azuresecretbackendrole.AzureSecretBackendRoleConfig { Connection: interface{}, @@ -1371,7 +1378,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azuresecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackendrole" azuresecretbackendrole.NewAzureSecretBackendRoleAzureGroupsList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) AzureSecretBackendRoleAzureGroupsList ``` @@ -1412,6 +1419,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1419,6 +1427,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -1514,7 +1538,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azuresecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackendrole" azuresecretbackendrole.NewAzureSecretBackendRoleAzureGroupsOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) AzureSecretBackendRoleAzureGroupsOutputReference ``` @@ -1814,7 +1838,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azuresecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackendrole" azuresecretbackendrole.NewAzureSecretBackendRoleAzureRolesList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) AzureSecretBackendRoleAzureRolesList ``` @@ -1855,6 +1879,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1862,6 +1887,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -1957,7 +1998,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/azuresecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackendrole" azuresecretbackendrole.NewAzureSecretBackendRoleAzureRolesOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) AzureSecretBackendRoleAzureRolesOutputReference ``` diff --git a/docs/azureSecretBackendRole.java.md b/docs/azureSecretBackendRole.java.md index d1bfd0d8..eafcc160 100644 --- a/docs/azureSecretBackendRole.java.md +++ b/docs/azureSecretBackendRole.java.md @@ -244,6 +244,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -327,6 +328,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java @@ -1611,6 +1618,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -1618,6 +1626,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java @@ -2054,6 +2078,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -2061,6 +2086,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java diff --git a/docs/azureSecretBackendRole.python.md b/docs/azureSecretBackendRole.python.md index df663d27..8d1db518 100644 --- a/docs/azureSecretBackendRole.python.md +++ b/docs/azureSecretBackendRole.python.md @@ -239,6 +239,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -327,6 +328,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python @@ -1653,6 +1660,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -1660,6 +1668,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python @@ -2131,6 +2157,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -2138,6 +2165,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python diff --git a/docs/azureSecretBackendRole.typescript.md b/docs/azureSecretBackendRole.typescript.md index 12f9315c..94f61bcc 100644 --- a/docs/azureSecretBackendRole.typescript.md +++ b/docs/azureSecretBackendRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -137,6 +138,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript @@ -1387,6 +1394,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -1394,6 +1402,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript @@ -1830,6 +1854,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -1837,6 +1862,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript diff --git a/docs/certAuthBackendRole.csharp.md b/docs/certAuthBackendRole.csharp.md index 2ae72722..42e1754f 100644 --- a/docs/certAuthBackendRole.csharp.md +++ b/docs/certAuthBackendRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -151,6 +152,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/certAuthBackendRole.go.md b/docs/certAuthBackendRole.go.md index ddd8a41b..40f80342 100644 --- a/docs/certAuthBackendRole.go.md +++ b/docs/certAuthBackendRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/certauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/certauthbackendrole" certauthbackendrole.NewCertAuthBackendRole(scope Construct, id *string, config CertAuthBackendRoleConfig) CertAuthBackendRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -151,6 +152,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -553,7 +560,7 @@ func ResetTokenType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/certauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/certauthbackendrole" certauthbackendrole.CertAuthBackendRole_IsConstruct(x interface{}) *bool ``` @@ -585,7 +592,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/certauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/certauthbackendrole" certauthbackendrole.CertAuthBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -599,7 +606,7 @@ certauthbackendrole.CertAuthBackendRole_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/certauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/certauthbackendrole" certauthbackendrole.CertAuthBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -613,7 +620,7 @@ certauthbackendrole.CertAuthBackendRole_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/certauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/certauthbackendrole" certauthbackendrole.CertAuthBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1458,7 +1465,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/certauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/certauthbackendrole" &certauthbackendrole.CertAuthBackendRoleConfig { Connection: interface{}, diff --git a/docs/certAuthBackendRole.java.md b/docs/certAuthBackendRole.java.md index db185e31..39c1239c 100644 --- a/docs/certAuthBackendRole.java.md +++ b/docs/certAuthBackendRole.java.md @@ -427,6 +427,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -524,6 +525,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/certAuthBackendRole.python.md b/docs/certAuthBackendRole.python.md index 8358e320..3ae3c5e1 100644 --- a/docs/certAuthBackendRole.python.md +++ b/docs/certAuthBackendRole.python.md @@ -421,6 +421,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -523,6 +524,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/certAuthBackendRole.typescript.md b/docs/certAuthBackendRole.typescript.md index 3d2f891b..69d359d0 100644 --- a/docs/certAuthBackendRole.typescript.md +++ b/docs/certAuthBackendRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -151,6 +152,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/consulSecretBackend.csharp.md b/docs/consulSecretBackend.csharp.md index b7726524..dd3f6d0c 100644 --- a/docs/consulSecretBackend.csharp.md +++ b/docs/consulSecretBackend.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -139,6 +140,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/consulSecretBackend.go.md b/docs/consulSecretBackend.go.md index fb2a1f3a..257358bf 100644 --- a/docs/consulSecretBackend.go.md +++ b/docs/consulSecretBackend.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/consulsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/consulsecretbackend" consulsecretbackend.NewConsulSecretBackend(scope Construct, id *string, config ConsulSecretBackendConfig) ConsulSecretBackend ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -139,6 +140,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -469,7 +476,7 @@ func ResetToken() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/consulsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/consulsecretbackend" consulsecretbackend.ConsulSecretBackend_IsConstruct(x interface{}) *bool ``` @@ -501,7 +508,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/consulsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/consulsecretbackend" consulsecretbackend.ConsulSecretBackend_IsTerraformElement(x interface{}) *bool ``` @@ -515,7 +522,7 @@ consulsecretbackend.ConsulSecretBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/consulsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/consulsecretbackend" consulsecretbackend.ConsulSecretBackend_IsTerraformResource(x interface{}) *bool ``` @@ -529,7 +536,7 @@ consulsecretbackend.ConsulSecretBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/consulsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/consulsecretbackend" consulsecretbackend.ConsulSecretBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1088,7 +1095,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/consulsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/consulsecretbackend" &consulsecretbackend.ConsulSecretBackendConfig { Connection: interface{}, diff --git a/docs/consulSecretBackend.java.md b/docs/consulSecretBackend.java.md index c96a4a7a..3b669ca2 100644 --- a/docs/consulSecretBackend.java.md +++ b/docs/consulSecretBackend.java.md @@ -294,6 +294,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -379,6 +380,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/consulSecretBackend.python.md b/docs/consulSecretBackend.python.md index e0180ee0..4cfa1621 100644 --- a/docs/consulSecretBackend.python.md +++ b/docs/consulSecretBackend.python.md @@ -289,6 +289,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -379,6 +380,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/consulSecretBackend.typescript.md b/docs/consulSecretBackend.typescript.md index 1876dd1d..8b2657b4 100644 --- a/docs/consulSecretBackend.typescript.md +++ b/docs/consulSecretBackend.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -139,6 +140,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/consulSecretBackendRole.csharp.md b/docs/consulSecretBackendRole.csharp.md index abdec238..aeaeb392 100644 --- a/docs/consulSecretBackendRole.csharp.md +++ b/docs/consulSecretBackendRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -139,6 +140,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/consulSecretBackendRole.go.md b/docs/consulSecretBackendRole.go.md index ee5b9572..671bf891 100644 --- a/docs/consulSecretBackendRole.go.md +++ b/docs/consulSecretBackendRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/consulsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/consulsecretbackendrole" consulsecretbackendrole.NewConsulSecretBackendRole(scope Construct, id *string, config ConsulSecretBackendRoleConfig) ConsulSecretBackendRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -139,6 +140,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -469,7 +476,7 @@ func ResetTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/consulsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/consulsecretbackendrole" consulsecretbackendrole.ConsulSecretBackendRole_IsConstruct(x interface{}) *bool ``` @@ -501,7 +508,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/consulsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/consulsecretbackendrole" consulsecretbackendrole.ConsulSecretBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -515,7 +522,7 @@ consulsecretbackendrole.ConsulSecretBackendRole_IsTerraformElement(x interface{} ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/consulsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/consulsecretbackendrole" consulsecretbackendrole.ConsulSecretBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -529,7 +536,7 @@ consulsecretbackendrole.ConsulSecretBackendRole_IsTerraformResource(x interface{ ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/consulsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/consulsecretbackendrole" consulsecretbackendrole.ConsulSecretBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1088,7 +1095,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/consulsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/consulsecretbackendrole" &consulsecretbackendrole.ConsulSecretBackendRoleConfig { Connection: interface{}, diff --git a/docs/consulSecretBackendRole.java.md b/docs/consulSecretBackendRole.java.md index d5a649f3..329d6923 100644 --- a/docs/consulSecretBackendRole.java.md +++ b/docs/consulSecretBackendRole.java.md @@ -290,6 +290,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -375,6 +376,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/consulSecretBackendRole.python.md b/docs/consulSecretBackendRole.python.md index 8c9c555a..351f4b23 100644 --- a/docs/consulSecretBackendRole.python.md +++ b/docs/consulSecretBackendRole.python.md @@ -287,6 +287,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -377,6 +378,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/consulSecretBackendRole.typescript.md b/docs/consulSecretBackendRole.typescript.md index 8934aa4b..3c1715ac 100644 --- a/docs/consulSecretBackendRole.typescript.md +++ b/docs/consulSecretBackendRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -139,6 +140,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultAdAccessCredentials.csharp.md b/docs/dataVaultAdAccessCredentials.csharp.md index bd210032..c414487e 100644 --- a/docs/dataVaultAdAccessCredentials.csharp.md +++ b/docs/dataVaultAdAccessCredentials.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultAdAccessCredentials.go.md b/docs/dataVaultAdAccessCredentials.go.md index 8d706ef4..316492cf 100644 --- a/docs/dataVaultAdAccessCredentials.go.md +++ b/docs/dataVaultAdAccessCredentials.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultadaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultadaccesscredentials" datavaultadaccesscredentials.NewDataVaultAdAccessCredentials(scope Construct, id *string, config DataVaultAdAccessCredentialsConfig) DataVaultAdAccessCredentials ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -281,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultadaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultadaccesscredentials" datavaultadaccesscredentials.DataVaultAdAccessCredentials_IsConstruct(x interface{}) *bool ``` @@ -313,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultadaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultadaccesscredentials" datavaultadaccesscredentials.DataVaultAdAccessCredentials_IsTerraformElement(x interface{}) *bool ``` @@ -327,7 +336,7 @@ datavaultadaccesscredentials.DataVaultAdAccessCredentials_IsTerraformElement(x i ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultadaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultadaccesscredentials" datavaultadaccesscredentials.DataVaultAdAccessCredentials_IsTerraformDataSource(x interface{}) *bool ``` @@ -341,7 +350,7 @@ datavaultadaccesscredentials.DataVaultAdAccessCredentials_IsTerraformDataSource( ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultadaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultadaccesscredentials" datavaultadaccesscredentials.DataVaultAdAccessCredentials_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -669,7 +678,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultadaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultadaccesscredentials" &datavaultadaccesscredentials.DataVaultAdAccessCredentialsConfig { Connection: interface{}, diff --git a/docs/dataVaultAdAccessCredentials.java.md b/docs/dataVaultAdAccessCredentials.java.md index 9ef11a5d..733be26d 100644 --- a/docs/dataVaultAdAccessCredentials.java.md +++ b/docs/dataVaultAdAccessCredentials.java.md @@ -157,6 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -224,6 +225,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultAdAccessCredentials.python.md b/docs/dataVaultAdAccessCredentials.python.md index 91545105..35c99bb0 100644 --- a/docs/dataVaultAdAccessCredentials.python.md +++ b/docs/dataVaultAdAccessCredentials.python.md @@ -155,6 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -227,6 +228,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultAdAccessCredentials.typescript.md b/docs/dataVaultAdAccessCredentials.typescript.md index 418723ef..e6e1d014 100644 --- a/docs/dataVaultAdAccessCredentials.typescript.md +++ b/docs/dataVaultAdAccessCredentials.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultApproleAuthBackendRoleId.csharp.md b/docs/dataVaultApproleAuthBackendRoleId.csharp.md index afe774cd..d16b1ad4 100644 --- a/docs/dataVaultApproleAuthBackendRoleId.csharp.md +++ b/docs/dataVaultApproleAuthBackendRoleId.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -122,6 +123,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultApproleAuthBackendRoleId.go.md b/docs/dataVaultApproleAuthBackendRoleId.go.md index 114109f7..e88c6347 100644 --- a/docs/dataVaultApproleAuthBackendRoleId.go.md +++ b/docs/dataVaultApproleAuthBackendRoleId.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultapproleauthbackendroleid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultapproleauthbackendroleid" datavaultapproleauthbackendroleid.NewDataVaultApproleAuthBackendRoleId(scope Construct, id *string, config DataVaultApproleAuthBackendRoleIdConfig) DataVaultApproleAuthBackendRoleId ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -122,6 +123,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -288,7 +297,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultapproleauthbackendroleid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultapproleauthbackendroleid" datavaultapproleauthbackendroleid.DataVaultApproleAuthBackendRoleId_IsConstruct(x interface{}) *bool ``` @@ -320,7 +329,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultapproleauthbackendroleid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultapproleauthbackendroleid" datavaultapproleauthbackendroleid.DataVaultApproleAuthBackendRoleId_IsTerraformElement(x interface{}) *bool ``` @@ -334,7 +343,7 @@ datavaultapproleauthbackendroleid.DataVaultApproleAuthBackendRoleId_IsTerraformE ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultapproleauthbackendroleid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultapproleauthbackendroleid" datavaultapproleauthbackendroleid.DataVaultApproleAuthBackendRoleId_IsTerraformDataSource(x interface{}) *bool ``` @@ -348,7 +357,7 @@ datavaultapproleauthbackendroleid.DataVaultApproleAuthBackendRoleId_IsTerraformD ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultapproleauthbackendroleid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultapproleauthbackendroleid" datavaultapproleauthbackendroleid.DataVaultApproleAuthBackendRoleId_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -654,7 +663,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultapproleauthbackendroleid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultapproleauthbackendroleid" &datavaultapproleauthbackendroleid.DataVaultApproleAuthBackendRoleIdConfig { Connection: interface{}, diff --git a/docs/dataVaultApproleAuthBackendRoleId.java.md b/docs/dataVaultApproleAuthBackendRoleId.java.md index 4f0ce089..052b5a7a 100644 --- a/docs/dataVaultApproleAuthBackendRoleId.java.md +++ b/docs/dataVaultApproleAuthBackendRoleId.java.md @@ -157,6 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -225,6 +226,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultApproleAuthBackendRoleId.python.md b/docs/dataVaultApproleAuthBackendRoleId.python.md index 6dcc1db5..b522b472 100644 --- a/docs/dataVaultApproleAuthBackendRoleId.python.md +++ b/docs/dataVaultApproleAuthBackendRoleId.python.md @@ -155,6 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -228,6 +229,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultApproleAuthBackendRoleId.typescript.md b/docs/dataVaultApproleAuthBackendRoleId.typescript.md index 7a9a5414..4e1cf45f 100644 --- a/docs/dataVaultApproleAuthBackendRoleId.typescript.md +++ b/docs/dataVaultApproleAuthBackendRoleId.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -122,6 +123,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultAuthBackend.csharp.md b/docs/dataVaultAuthBackend.csharp.md index c77b7bca..a3cd733d 100644 --- a/docs/dataVaultAuthBackend.csharp.md +++ b/docs/dataVaultAuthBackend.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultAuthBackend.go.md b/docs/dataVaultAuthBackend.go.md index 38112652..df298030 100644 --- a/docs/dataVaultAuthBackend.go.md +++ b/docs/dataVaultAuthBackend.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultauthbackend" datavaultauthbackend.NewDataVaultAuthBackend(scope Construct, id *string, config DataVaultAuthBackendConfig) DataVaultAuthBackend ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -281,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultauthbackend" datavaultauthbackend.DataVaultAuthBackend_IsConstruct(x interface{}) *bool ``` @@ -313,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultauthbackend" datavaultauthbackend.DataVaultAuthBackend_IsTerraformElement(x interface{}) *bool ``` @@ -327,7 +336,7 @@ datavaultauthbackend.DataVaultAuthBackend_IsTerraformElement(x interface{}) *boo ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultauthbackend" datavaultauthbackend.DataVaultAuthBackend_IsTerraformDataSource(x interface{}) *bool ``` @@ -341,7 +350,7 @@ datavaultauthbackend.DataVaultAuthBackend_IsTerraformDataSource(x interface{}) * ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultauthbackend" datavaultauthbackend.DataVaultAuthBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -691,7 +700,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultauthbackend" &datavaultauthbackend.DataVaultAuthBackendConfig { Connection: interface{}, diff --git a/docs/dataVaultAuthBackend.java.md b/docs/dataVaultAuthBackend.java.md index 82eb69dd..a294ac22 100644 --- a/docs/dataVaultAuthBackend.java.md +++ b/docs/dataVaultAuthBackend.java.md @@ -145,6 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -212,6 +213,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultAuthBackend.python.md b/docs/dataVaultAuthBackend.python.md index ed1dd8f0..84ef4b5f 100644 --- a/docs/dataVaultAuthBackend.python.md +++ b/docs/dataVaultAuthBackend.python.md @@ -143,6 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -215,6 +216,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultAuthBackend.typescript.md b/docs/dataVaultAuthBackend.typescript.md index 5c66e0f5..bc88d3fc 100644 --- a/docs/dataVaultAuthBackend.typescript.md +++ b/docs/dataVaultAuthBackend.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultAuthBackends.csharp.md b/docs/dataVaultAuthBackends.csharp.md index 1ac66a9b..db3546b4 100644 --- a/docs/dataVaultAuthBackends.csharp.md +++ b/docs/dataVaultAuthBackends.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -122,6 +123,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultAuthBackends.go.md b/docs/dataVaultAuthBackends.go.md index 92208e7f..bb938a2b 100644 --- a/docs/dataVaultAuthBackends.go.md +++ b/docs/dataVaultAuthBackends.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultauthbackends" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultauthbackends" datavaultauthbackends.NewDataVaultAuthBackends(scope Construct, id *string, config DataVaultAuthBackendsConfig) DataVaultAuthBackends ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -122,6 +123,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -288,7 +297,7 @@ func ResetType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultauthbackends" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultauthbackends" datavaultauthbackends.DataVaultAuthBackends_IsConstruct(x interface{}) *bool ``` @@ -320,7 +329,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultauthbackends" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultauthbackends" datavaultauthbackends.DataVaultAuthBackends_IsTerraformElement(x interface{}) *bool ``` @@ -334,7 +343,7 @@ datavaultauthbackends.DataVaultAuthBackends_IsTerraformElement(x interface{}) *b ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultauthbackends" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultauthbackends" datavaultauthbackends.DataVaultAuthBackends_IsTerraformDataSource(x interface{}) *bool ``` @@ -348,7 +357,7 @@ datavaultauthbackends.DataVaultAuthBackends_IsTerraformDataSource(x interface{}) ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultauthbackends" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultauthbackends" datavaultauthbackends.DataVaultAuthBackends_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -643,7 +652,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultauthbackends" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultauthbackends" &datavaultauthbackends.DataVaultAuthBackendsConfig { Connection: interface{}, diff --git a/docs/dataVaultAuthBackends.java.md b/docs/dataVaultAuthBackends.java.md index cf4d1064..3044ec67 100644 --- a/docs/dataVaultAuthBackends.java.md +++ b/docs/dataVaultAuthBackends.java.md @@ -145,6 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -213,6 +214,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultAuthBackends.python.md b/docs/dataVaultAuthBackends.python.md index f291d0ad..b158d442 100644 --- a/docs/dataVaultAuthBackends.python.md +++ b/docs/dataVaultAuthBackends.python.md @@ -143,6 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -216,6 +217,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultAuthBackends.typescript.md b/docs/dataVaultAuthBackends.typescript.md index e20142b8..7c61c0fe 100644 --- a/docs/dataVaultAuthBackends.typescript.md +++ b/docs/dataVaultAuthBackends.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -122,6 +123,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultAwsAccessCredentials.csharp.md b/docs/dataVaultAwsAccessCredentials.csharp.md index 49b69cd7..78687672 100644 --- a/docs/dataVaultAwsAccessCredentials.csharp.md +++ b/docs/dataVaultAwsAccessCredentials.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -125,6 +126,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultAwsAccessCredentials.go.md b/docs/dataVaultAwsAccessCredentials.go.md index f0cf635e..ffd7cc35 100644 --- a/docs/dataVaultAwsAccessCredentials.go.md +++ b/docs/dataVaultAwsAccessCredentials.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultawsaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultawsaccesscredentials" datavaultawsaccesscredentials.NewDataVaultAwsAccessCredentials(scope Construct, id *string, config DataVaultAwsAccessCredentialsConfig) DataVaultAwsAccessCredentials ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -125,6 +126,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -309,7 +318,7 @@ func ResetType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultawsaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultawsaccesscredentials" datavaultawsaccesscredentials.DataVaultAwsAccessCredentials_IsConstruct(x interface{}) *bool ``` @@ -341,7 +350,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultawsaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultawsaccesscredentials" datavaultawsaccesscredentials.DataVaultAwsAccessCredentials_IsTerraformElement(x interface{}) *bool ``` @@ -355,7 +364,7 @@ datavaultawsaccesscredentials.DataVaultAwsAccessCredentials_IsTerraformElement(x ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultawsaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultawsaccesscredentials" datavaultawsaccesscredentials.DataVaultAwsAccessCredentials_IsTerraformDataSource(x interface{}) *bool ``` @@ -369,7 +378,7 @@ datavaultawsaccesscredentials.DataVaultAwsAccessCredentials_IsTerraformDataSourc ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultawsaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultawsaccesscredentials" datavaultawsaccesscredentials.DataVaultAwsAccessCredentials_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -829,7 +838,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultawsaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultawsaccesscredentials" &datavaultawsaccesscredentials.DataVaultAwsAccessCredentialsConfig { Connection: interface{}, diff --git a/docs/dataVaultAwsAccessCredentials.java.md b/docs/dataVaultAwsAccessCredentials.java.md index 1438ea68..29d8d390 100644 --- a/docs/dataVaultAwsAccessCredentials.java.md +++ b/docs/dataVaultAwsAccessCredentials.java.md @@ -205,6 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -276,6 +277,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultAwsAccessCredentials.python.md b/docs/dataVaultAwsAccessCredentials.python.md index a0dde686..56e85ac5 100644 --- a/docs/dataVaultAwsAccessCredentials.python.md +++ b/docs/dataVaultAwsAccessCredentials.python.md @@ -203,6 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -279,6 +280,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultAwsAccessCredentials.typescript.md b/docs/dataVaultAwsAccessCredentials.typescript.md index bc09dbab..8e13dbd6 100644 --- a/docs/dataVaultAwsAccessCredentials.typescript.md +++ b/docs/dataVaultAwsAccessCredentials.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -125,6 +126,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultAwsStaticAccessCredentials.csharp.md b/docs/dataVaultAwsStaticAccessCredentials.csharp.md index d697532c..a40d5c08 100644 --- a/docs/dataVaultAwsStaticAccessCredentials.csharp.md +++ b/docs/dataVaultAwsStaticAccessCredentials.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultAwsStaticAccessCredentials.go.md b/docs/dataVaultAwsStaticAccessCredentials.go.md index 6479c51c..6db1cb7d 100644 --- a/docs/dataVaultAwsStaticAccessCredentials.go.md +++ b/docs/dataVaultAwsStaticAccessCredentials.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultawsstaticaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultawsstaticaccesscredentials" datavaultawsstaticaccesscredentials.NewDataVaultAwsStaticAccessCredentials(scope Construct, id *string, config DataVaultAwsStaticAccessCredentialsConfig) DataVaultAwsStaticAccessCredentials ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -281,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultawsstaticaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultawsstaticaccesscredentials" datavaultawsstaticaccesscredentials.DataVaultAwsStaticAccessCredentials_IsConstruct(x interface{}) *bool ``` @@ -313,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultawsstaticaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultawsstaticaccesscredentials" datavaultawsstaticaccesscredentials.DataVaultAwsStaticAccessCredentials_IsTerraformElement(x interface{}) *bool ``` @@ -327,7 +336,7 @@ datavaultawsstaticaccesscredentials.DataVaultAwsStaticAccessCredentials_IsTerraf ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultawsstaticaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultawsstaticaccesscredentials" datavaultawsstaticaccesscredentials.DataVaultAwsStaticAccessCredentials_IsTerraformDataSource(x interface{}) *bool ``` @@ -341,7 +350,7 @@ datavaultawsstaticaccesscredentials.DataVaultAwsStaticAccessCredentials_IsTerraf ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultawsstaticaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultawsstaticaccesscredentials" datavaultawsstaticaccesscredentials.DataVaultAwsStaticAccessCredentials_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -658,7 +667,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultawsstaticaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultawsstaticaccesscredentials" &datavaultawsstaticaccesscredentials.DataVaultAwsStaticAccessCredentialsConfig { Connection: interface{}, diff --git a/docs/dataVaultAwsStaticAccessCredentials.java.md b/docs/dataVaultAwsStaticAccessCredentials.java.md index b8e8fa21..6373ad19 100644 --- a/docs/dataVaultAwsStaticAccessCredentials.java.md +++ b/docs/dataVaultAwsStaticAccessCredentials.java.md @@ -157,6 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -224,6 +225,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultAwsStaticAccessCredentials.python.md b/docs/dataVaultAwsStaticAccessCredentials.python.md index 9311e07d..7452c248 100644 --- a/docs/dataVaultAwsStaticAccessCredentials.python.md +++ b/docs/dataVaultAwsStaticAccessCredentials.python.md @@ -155,6 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -227,6 +228,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultAwsStaticAccessCredentials.typescript.md b/docs/dataVaultAwsStaticAccessCredentials.typescript.md index 0641168c..afbf8d7d 100644 --- a/docs/dataVaultAwsStaticAccessCredentials.typescript.md +++ b/docs/dataVaultAwsStaticAccessCredentials.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultAzureAccessCredentials.csharp.md b/docs/dataVaultAzureAccessCredentials.csharp.md index a43c7760..eecf169c 100644 --- a/docs/dataVaultAzureAccessCredentials.csharp.md +++ b/docs/dataVaultAzureAccessCredentials.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -128,6 +129,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultAzureAccessCredentials.go.md b/docs/dataVaultAzureAccessCredentials.go.md index b956aec6..4bf0b3c8 100644 --- a/docs/dataVaultAzureAccessCredentials.go.md +++ b/docs/dataVaultAzureAccessCredentials.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultazureaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultazureaccesscredentials" datavaultazureaccesscredentials.NewDataVaultAzureAccessCredentials(scope Construct, id *string, config DataVaultAzureAccessCredentialsConfig) DataVaultAzureAccessCredentials ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -128,6 +129,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -330,7 +339,7 @@ func ResetValidateCreds() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultazureaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultazureaccesscredentials" datavaultazureaccesscredentials.DataVaultAzureAccessCredentials_IsConstruct(x interface{}) *bool ``` @@ -362,7 +371,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultazureaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultazureaccesscredentials" datavaultazureaccesscredentials.DataVaultAzureAccessCredentials_IsTerraformElement(x interface{}) *bool ``` @@ -376,7 +385,7 @@ datavaultazureaccesscredentials.DataVaultAzureAccessCredentials_IsTerraformEleme ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultazureaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultazureaccesscredentials" datavaultazureaccesscredentials.DataVaultAzureAccessCredentials_IsTerraformDataSource(x interface{}) *bool ``` @@ -390,7 +399,7 @@ datavaultazureaccesscredentials.DataVaultAzureAccessCredentials_IsTerraformDataS ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultazureaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultazureaccesscredentials" datavaultazureaccesscredentials.DataVaultAzureAccessCredentials_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -905,7 +914,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultazureaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultazureaccesscredentials" &datavaultazureaccesscredentials.DataVaultAzureAccessCredentialsConfig { Connection: interface{}, diff --git a/docs/dataVaultAzureAccessCredentials.java.md b/docs/dataVaultAzureAccessCredentials.java.md index b4dd43f4..04abe0c5 100644 --- a/docs/dataVaultAzureAccessCredentials.java.md +++ b/docs/dataVaultAzureAccessCredentials.java.md @@ -245,6 +245,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -319,6 +320,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultAzureAccessCredentials.python.md b/docs/dataVaultAzureAccessCredentials.python.md index a80ae280..e8363018 100644 --- a/docs/dataVaultAzureAccessCredentials.python.md +++ b/docs/dataVaultAzureAccessCredentials.python.md @@ -242,6 +242,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -321,6 +322,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultAzureAccessCredentials.typescript.md b/docs/dataVaultAzureAccessCredentials.typescript.md index 8df0ec92..c4273255 100644 --- a/docs/dataVaultAzureAccessCredentials.typescript.md +++ b/docs/dataVaultAzureAccessCredentials.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -128,6 +129,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultGcpAuthBackendRole.csharp.md b/docs/dataVaultGcpAuthBackendRole.csharp.md index 97934587..97b27ef7 100644 --- a/docs/dataVaultGcpAuthBackendRole.csharp.md +++ b/docs/dataVaultGcpAuthBackendRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -131,6 +132,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultGcpAuthBackendRole.go.md b/docs/dataVaultGcpAuthBackendRole.go.md index 9070c487..a6d85a3f 100644 --- a/docs/dataVaultGcpAuthBackendRole.go.md +++ b/docs/dataVaultGcpAuthBackendRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultgcpauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultgcpauthbackendrole" datavaultgcpauthbackendrole.NewDataVaultGcpAuthBackendRole(scope Construct, id *string, config DataVaultGcpAuthBackendRoleConfig) DataVaultGcpAuthBackendRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -131,6 +132,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -351,7 +360,7 @@ func ResetTokenType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultgcpauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultgcpauthbackendrole" datavaultgcpauthbackendrole.DataVaultGcpAuthBackendRole_IsConstruct(x interface{}) *bool ``` @@ -383,7 +392,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultgcpauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultgcpauthbackendrole" datavaultgcpauthbackendrole.DataVaultGcpAuthBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -397,7 +406,7 @@ datavaultgcpauthbackendrole.DataVaultGcpAuthBackendRole_IsTerraformElement(x int ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultgcpauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultgcpauthbackendrole" datavaultgcpauthbackendrole.DataVaultGcpAuthBackendRole_IsTerraformDataSource(x interface{}) *bool ``` @@ -411,7 +420,7 @@ datavaultgcpauthbackendrole.DataVaultGcpAuthBackendRole_IsTerraformDataSource(x ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultgcpauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultgcpauthbackendrole" datavaultgcpauthbackendrole.DataVaultGcpAuthBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -992,7 +1001,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultgcpauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultgcpauthbackendrole" &datavaultgcpauthbackendrole.DataVaultGcpAuthBackendRoleConfig { Connection: interface{}, diff --git a/docs/dataVaultGcpAuthBackendRole.java.md b/docs/dataVaultGcpAuthBackendRole.java.md index 375f006a..dfd428ae 100644 --- a/docs/dataVaultGcpAuthBackendRole.java.md +++ b/docs/dataVaultGcpAuthBackendRole.java.md @@ -266,6 +266,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -343,6 +344,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultGcpAuthBackendRole.python.md b/docs/dataVaultGcpAuthBackendRole.python.md index 9ff44938..81558010 100644 --- a/docs/dataVaultGcpAuthBackendRole.python.md +++ b/docs/dataVaultGcpAuthBackendRole.python.md @@ -263,6 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -345,6 +346,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultGcpAuthBackendRole.typescript.md b/docs/dataVaultGcpAuthBackendRole.typescript.md index 0efa1233..71194467 100644 --- a/docs/dataVaultGcpAuthBackendRole.typescript.md +++ b/docs/dataVaultGcpAuthBackendRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -131,6 +132,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultGenericSecret.csharp.md b/docs/dataVaultGenericSecret.csharp.md index a38592d8..c7210ad2 100644 --- a/docs/dataVaultGenericSecret.csharp.md +++ b/docs/dataVaultGenericSecret.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -123,6 +124,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultGenericSecret.go.md b/docs/dataVaultGenericSecret.go.md index db47caa6..85c12059 100644 --- a/docs/dataVaultGenericSecret.go.md +++ b/docs/dataVaultGenericSecret.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultgenericsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultgenericsecret" datavaultgenericsecret.NewDataVaultGenericSecret(scope Construct, id *string, config DataVaultGenericSecretConfig) DataVaultGenericSecret ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -123,6 +124,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -295,7 +304,7 @@ func ResetWithLeaseStartTime() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultgenericsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultgenericsecret" datavaultgenericsecret.DataVaultGenericSecret_IsConstruct(x interface{}) *bool ``` @@ -327,7 +336,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultgenericsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultgenericsecret" datavaultgenericsecret.DataVaultGenericSecret_IsTerraformElement(x interface{}) *bool ``` @@ -341,7 +350,7 @@ datavaultgenericsecret.DataVaultGenericSecret_IsTerraformElement(x interface{}) ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultgenericsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultgenericsecret" datavaultgenericsecret.DataVaultGenericSecret_IsTerraformDataSource(x interface{}) *bool ``` @@ -355,7 +364,7 @@ datavaultgenericsecret.DataVaultGenericSecret_IsTerraformDataSource(x interface{ ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultgenericsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultgenericsecret" datavaultgenericsecret.DataVaultGenericSecret_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -738,7 +747,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultgenericsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultgenericsecret" &datavaultgenericsecret.DataVaultGenericSecretConfig { Connection: interface{}, diff --git a/docs/dataVaultGenericSecret.java.md b/docs/dataVaultGenericSecret.java.md index b4e8acc3..e9a1ac9b 100644 --- a/docs/dataVaultGenericSecret.java.md +++ b/docs/dataVaultGenericSecret.java.md @@ -168,6 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -237,6 +238,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultGenericSecret.python.md b/docs/dataVaultGenericSecret.python.md index 12f81cc8..e36a9089 100644 --- a/docs/dataVaultGenericSecret.python.md +++ b/docs/dataVaultGenericSecret.python.md @@ -165,6 +165,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -239,6 +240,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultGenericSecret.typescript.md b/docs/dataVaultGenericSecret.typescript.md index 1c212267..0a5d5ab0 100644 --- a/docs/dataVaultGenericSecret.typescript.md +++ b/docs/dataVaultGenericSecret.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -123,6 +124,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultIdentityEntity.csharp.md b/docs/dataVaultIdentityEntity.csharp.md index d3fdecf4..81a9ec6c 100644 --- a/docs/dataVaultIdentityEntity.csharp.md +++ b/docs/dataVaultIdentityEntity.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -126,6 +127,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp @@ -1140,6 +1149,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1147,6 +1157,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp diff --git a/docs/dataVaultIdentityEntity.go.md b/docs/dataVaultIdentityEntity.go.md index 95fe5815..1f50b856 100644 --- a/docs/dataVaultIdentityEntity.go.md +++ b/docs/dataVaultIdentityEntity.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityentity" datavaultidentityentity.NewDataVaultIdentityEntity(scope Construct, id *string, config DataVaultIdentityEntityConfig) DataVaultIdentityEntity ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -126,6 +127,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -316,7 +325,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityentity" datavaultidentityentity.DataVaultIdentityEntity_IsConstruct(x interface{}) *bool ``` @@ -348,7 +357,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityentity" datavaultidentityentity.DataVaultIdentityEntity_IsTerraformElement(x interface{}) *bool ``` @@ -362,7 +371,7 @@ datavaultidentityentity.DataVaultIdentityEntity_IsTerraformElement(x interface{} ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityentity" datavaultidentityentity.DataVaultIdentityEntity_IsTerraformDataSource(x interface{}) *bool ``` @@ -376,7 +385,7 @@ datavaultidentityentity.DataVaultIdentityEntity_IsTerraformDataSource(x interfac ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityentity" datavaultidentityentity.DataVaultIdentityEntity_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -869,7 +878,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityentity" &datavaultidentityentity.DataVaultIdentityEntityAliases { @@ -882,7 +891,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentityenti #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityentity" &datavaultidentityentity.DataVaultIdentityEntityConfig { Connection: interface{}, @@ -1099,7 +1108,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityentity" datavaultidentityentity.NewDataVaultIdentityEntityAliasesList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DataVaultIdentityEntityAliasesList ``` @@ -1140,6 +1149,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1147,6 +1157,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -1231,7 +1257,7 @@ func Fqn() *string #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityentity" datavaultidentityentity.NewDataVaultIdentityEntityAliasesOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DataVaultIdentityEntityAliasesOutputReference ``` diff --git a/docs/dataVaultIdentityEntity.java.md b/docs/dataVaultIdentityEntity.java.md index d3d3175b..b0367f6b 100644 --- a/docs/dataVaultIdentityEntity.java.md +++ b/docs/dataVaultIdentityEntity.java.md @@ -193,6 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -265,6 +266,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java @@ -1282,6 +1291,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -1289,6 +1299,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java diff --git a/docs/dataVaultIdentityEntity.python.md b/docs/dataVaultIdentityEntity.python.md index 638bd838..22ed9f12 100644 --- a/docs/dataVaultIdentityEntity.python.md +++ b/docs/dataVaultIdentityEntity.python.md @@ -191,6 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -268,6 +269,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python @@ -1315,6 +1324,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -1322,6 +1332,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python diff --git a/docs/dataVaultIdentityEntity.typescript.md b/docs/dataVaultIdentityEntity.typescript.md index 54fd813b..3598b5e8 100644 --- a/docs/dataVaultIdentityEntity.typescript.md +++ b/docs/dataVaultIdentityEntity.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -126,6 +127,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript @@ -1123,6 +1132,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -1130,6 +1140,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript diff --git a/docs/dataVaultIdentityGroup.csharp.md b/docs/dataVaultIdentityGroup.csharp.md index bb7a8e73..752e32d5 100644 --- a/docs/dataVaultIdentityGroup.csharp.md +++ b/docs/dataVaultIdentityGroup.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -126,6 +127,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultIdentityGroup.go.md b/docs/dataVaultIdentityGroup.go.md index c23d7a72..673995b5 100644 --- a/docs/dataVaultIdentityGroup.go.md +++ b/docs/dataVaultIdentityGroup.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentitygroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentitygroup" datavaultidentitygroup.NewDataVaultIdentityGroup(scope Construct, id *string, config DataVaultIdentityGroupConfig) DataVaultIdentityGroup ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -126,6 +127,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -316,7 +325,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentitygroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentitygroup" datavaultidentitygroup.DataVaultIdentityGroup_IsConstruct(x interface{}) *bool ``` @@ -348,7 +357,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentitygroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentitygroup" datavaultidentitygroup.DataVaultIdentityGroup_IsTerraformElement(x interface{}) *bool ``` @@ -362,7 +371,7 @@ datavaultidentitygroup.DataVaultIdentityGroup_IsTerraformElement(x interface{}) ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentitygroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentitygroup" datavaultidentitygroup.DataVaultIdentityGroup_IsTerraformDataSource(x interface{}) *bool ``` @@ -376,7 +385,7 @@ datavaultidentitygroup.DataVaultIdentityGroup_IsTerraformDataSource(x interface{ ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentitygroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentitygroup" datavaultidentitygroup.DataVaultIdentityGroup_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -935,7 +944,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentitygroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentitygroup" &datavaultidentitygroup.DataVaultIdentityGroupConfig { Connection: interface{}, diff --git a/docs/dataVaultIdentityGroup.java.md b/docs/dataVaultIdentityGroup.java.md index af9a8eda..4fa59ffd 100644 --- a/docs/dataVaultIdentityGroup.java.md +++ b/docs/dataVaultIdentityGroup.java.md @@ -193,6 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -265,6 +266,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultIdentityGroup.python.md b/docs/dataVaultIdentityGroup.python.md index 57d3d628..82a8f33d 100644 --- a/docs/dataVaultIdentityGroup.python.md +++ b/docs/dataVaultIdentityGroup.python.md @@ -191,6 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -268,6 +269,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultIdentityGroup.typescript.md b/docs/dataVaultIdentityGroup.typescript.md index 5534cabf..476fa893 100644 --- a/docs/dataVaultIdentityGroup.typescript.md +++ b/docs/dataVaultIdentityGroup.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -126,6 +127,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultIdentityOidcClientCreds.csharp.md b/docs/dataVaultIdentityOidcClientCreds.csharp.md index 0ad312b3..2edde31c 100644 --- a/docs/dataVaultIdentityOidcClientCreds.csharp.md +++ b/docs/dataVaultIdentityOidcClientCreds.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultIdentityOidcClientCreds.go.md b/docs/dataVaultIdentityOidcClientCreds.go.md index 4c2fa47c..22468a91 100644 --- a/docs/dataVaultIdentityOidcClientCreds.go.md +++ b/docs/dataVaultIdentityOidcClientCreds.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentityoidcclientcreds" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcclientcreds" datavaultidentityoidcclientcreds.NewDataVaultIdentityOidcClientCreds(scope Construct, id *string, config DataVaultIdentityOidcClientCredsConfig) DataVaultIdentityOidcClientCreds ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -281,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentityoidcclientcreds" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcclientcreds" datavaultidentityoidcclientcreds.DataVaultIdentityOidcClientCreds_IsConstruct(x interface{}) *bool ``` @@ -313,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentityoidcclientcreds" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcclientcreds" datavaultidentityoidcclientcreds.DataVaultIdentityOidcClientCreds_IsTerraformElement(x interface{}) *bool ``` @@ -327,7 +336,7 @@ datavaultidentityoidcclientcreds.DataVaultIdentityOidcClientCreds_IsTerraformEle ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentityoidcclientcreds" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcclientcreds" datavaultidentityoidcclientcreds.DataVaultIdentityOidcClientCreds_IsTerraformDataSource(x interface{}) *bool ``` @@ -341,7 +350,7 @@ datavaultidentityoidcclientcreds.DataVaultIdentityOidcClientCreds_IsTerraformDat ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentityoidcclientcreds" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcclientcreds" datavaultidentityoidcclientcreds.DataVaultIdentityOidcClientCreds_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -636,7 +645,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentityoidcclientcreds" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcclientcreds" &datavaultidentityoidcclientcreds.DataVaultIdentityOidcClientCredsConfig { Connection: interface{}, diff --git a/docs/dataVaultIdentityOidcClientCreds.java.md b/docs/dataVaultIdentityOidcClientCreds.java.md index 92312b5a..941197ed 100644 --- a/docs/dataVaultIdentityOidcClientCreds.java.md +++ b/docs/dataVaultIdentityOidcClientCreds.java.md @@ -145,6 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -212,6 +213,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultIdentityOidcClientCreds.python.md b/docs/dataVaultIdentityOidcClientCreds.python.md index 450848a8..c1770223 100644 --- a/docs/dataVaultIdentityOidcClientCreds.python.md +++ b/docs/dataVaultIdentityOidcClientCreds.python.md @@ -143,6 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -215,6 +216,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultIdentityOidcClientCreds.typescript.md b/docs/dataVaultIdentityOidcClientCreds.typescript.md index e9c79d7a..9f323d46 100644 --- a/docs/dataVaultIdentityOidcClientCreds.typescript.md +++ b/docs/dataVaultIdentityOidcClientCreds.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultIdentityOidcOpenidConfig.csharp.md b/docs/dataVaultIdentityOidcOpenidConfig.csharp.md index 4af04d38..6d0d292e 100644 --- a/docs/dataVaultIdentityOidcOpenidConfig.csharp.md +++ b/docs/dataVaultIdentityOidcOpenidConfig.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultIdentityOidcOpenidConfig.go.md b/docs/dataVaultIdentityOidcOpenidConfig.go.md index f05cda8a..53665789 100644 --- a/docs/dataVaultIdentityOidcOpenidConfig.go.md +++ b/docs/dataVaultIdentityOidcOpenidConfig.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentityoidcopenidconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcopenidconfig" datavaultidentityoidcopenidconfig.NewDataVaultIdentityOidcOpenidConfig(scope Construct, id *string, config DataVaultIdentityOidcOpenidConfigConfig) DataVaultIdentityOidcOpenidConfig ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -281,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentityoidcopenidconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcopenidconfig" datavaultidentityoidcopenidconfig.DataVaultIdentityOidcOpenidConfig_IsConstruct(x interface{}) *bool ``` @@ -313,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentityoidcopenidconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcopenidconfig" datavaultidentityoidcopenidconfig.DataVaultIdentityOidcOpenidConfig_IsTerraformElement(x interface{}) *bool ``` @@ -327,7 +336,7 @@ datavaultidentityoidcopenidconfig.DataVaultIdentityOidcOpenidConfig_IsTerraformE ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentityoidcopenidconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcopenidconfig" datavaultidentityoidcopenidconfig.DataVaultIdentityOidcOpenidConfig_IsTerraformDataSource(x interface{}) *bool ``` @@ -341,7 +350,7 @@ datavaultidentityoidcopenidconfig.DataVaultIdentityOidcOpenidConfig_IsTerraformD ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentityoidcopenidconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcopenidconfig" datavaultidentityoidcopenidconfig.DataVaultIdentityOidcOpenidConfig_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -746,7 +755,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentityoidcopenidconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcopenidconfig" &datavaultidentityoidcopenidconfig.DataVaultIdentityOidcOpenidConfigConfig { Connection: interface{}, diff --git a/docs/dataVaultIdentityOidcOpenidConfig.java.md b/docs/dataVaultIdentityOidcOpenidConfig.java.md index 96f9593a..c42113ce 100644 --- a/docs/dataVaultIdentityOidcOpenidConfig.java.md +++ b/docs/dataVaultIdentityOidcOpenidConfig.java.md @@ -145,6 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -212,6 +213,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultIdentityOidcOpenidConfig.python.md b/docs/dataVaultIdentityOidcOpenidConfig.python.md index 5b5d24e9..a04c3c16 100644 --- a/docs/dataVaultIdentityOidcOpenidConfig.python.md +++ b/docs/dataVaultIdentityOidcOpenidConfig.python.md @@ -143,6 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -215,6 +216,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultIdentityOidcOpenidConfig.typescript.md b/docs/dataVaultIdentityOidcOpenidConfig.typescript.md index d21b2817..e44dded2 100644 --- a/docs/dataVaultIdentityOidcOpenidConfig.typescript.md +++ b/docs/dataVaultIdentityOidcOpenidConfig.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultIdentityOidcPublicKeys.csharp.md b/docs/dataVaultIdentityOidcPublicKeys.csharp.md index 346c719a..0a4f15ee 100644 --- a/docs/dataVaultIdentityOidcPublicKeys.csharp.md +++ b/docs/dataVaultIdentityOidcPublicKeys.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultIdentityOidcPublicKeys.go.md b/docs/dataVaultIdentityOidcPublicKeys.go.md index 3722cfc6..fa25370f 100644 --- a/docs/dataVaultIdentityOidcPublicKeys.go.md +++ b/docs/dataVaultIdentityOidcPublicKeys.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentityoidcpublickeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcpublickeys" datavaultidentityoidcpublickeys.NewDataVaultIdentityOidcPublicKeys(scope Construct, id *string, config DataVaultIdentityOidcPublicKeysConfig) DataVaultIdentityOidcPublicKeys ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -281,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentityoidcpublickeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcpublickeys" datavaultidentityoidcpublickeys.DataVaultIdentityOidcPublicKeys_IsConstruct(x interface{}) *bool ``` @@ -313,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentityoidcpublickeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcpublickeys" datavaultidentityoidcpublickeys.DataVaultIdentityOidcPublicKeys_IsTerraformElement(x interface{}) *bool ``` @@ -327,7 +336,7 @@ datavaultidentityoidcpublickeys.DataVaultIdentityOidcPublicKeys_IsTerraformEleme ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentityoidcpublickeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcpublickeys" datavaultidentityoidcpublickeys.DataVaultIdentityOidcPublicKeys_IsTerraformDataSource(x interface{}) *bool ``` @@ -341,7 +350,7 @@ datavaultidentityoidcpublickeys.DataVaultIdentityOidcPublicKeys_IsTerraformDataS ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentityoidcpublickeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcpublickeys" datavaultidentityoidcpublickeys.DataVaultIdentityOidcPublicKeys_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -625,7 +634,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultidentityoidcpublickeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcpublickeys" &datavaultidentityoidcpublickeys.DataVaultIdentityOidcPublicKeysConfig { Connection: interface{}, diff --git a/docs/dataVaultIdentityOidcPublicKeys.java.md b/docs/dataVaultIdentityOidcPublicKeys.java.md index faa8a44f..dc688ec8 100644 --- a/docs/dataVaultIdentityOidcPublicKeys.java.md +++ b/docs/dataVaultIdentityOidcPublicKeys.java.md @@ -145,6 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -212,6 +213,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultIdentityOidcPublicKeys.python.md b/docs/dataVaultIdentityOidcPublicKeys.python.md index a237f519..a7b186fc 100644 --- a/docs/dataVaultIdentityOidcPublicKeys.python.md +++ b/docs/dataVaultIdentityOidcPublicKeys.python.md @@ -143,6 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -215,6 +216,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultIdentityOidcPublicKeys.typescript.md b/docs/dataVaultIdentityOidcPublicKeys.typescript.md index 16173542..78543ac6 100644 --- a/docs/dataVaultIdentityOidcPublicKeys.typescript.md +++ b/docs/dataVaultIdentityOidcPublicKeys.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultKubernetesAuthBackendConfig.csharp.md b/docs/dataVaultKubernetesAuthBackendConfig.csharp.md index 4fcc6540..4a34f3d5 100644 --- a/docs/dataVaultKubernetesAuthBackendConfig.csharp.md +++ b/docs/dataVaultKubernetesAuthBackendConfig.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -128,6 +129,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultKubernetesAuthBackendConfig.go.md b/docs/dataVaultKubernetesAuthBackendConfig.go.md index 9a2c84b9..694d55d3 100644 --- a/docs/dataVaultKubernetesAuthBackendConfig.go.md +++ b/docs/dataVaultKubernetesAuthBackendConfig.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkubernetesauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesauthbackendconfig" datavaultkubernetesauthbackendconfig.NewDataVaultKubernetesAuthBackendConfig(scope Construct, id *string, config DataVaultKubernetesAuthBackendConfigConfig) DataVaultKubernetesAuthBackendConfig ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -128,6 +129,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -330,7 +339,7 @@ func ResetPemKeys() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkubernetesauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesauthbackendconfig" datavaultkubernetesauthbackendconfig.DataVaultKubernetesAuthBackendConfig_IsConstruct(x interface{}) *bool ``` @@ -362,7 +371,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkubernetesauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesauthbackendconfig" datavaultkubernetesauthbackendconfig.DataVaultKubernetesAuthBackendConfig_IsTerraformElement(x interface{}) *bool ``` @@ -376,7 +385,7 @@ datavaultkubernetesauthbackendconfig.DataVaultKubernetesAuthBackendConfig_IsTerr ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkubernetesauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesauthbackendconfig" datavaultkubernetesauthbackendconfig.DataVaultKubernetesAuthBackendConfig_IsTerraformDataSource(x interface{}) *bool ``` @@ -390,7 +399,7 @@ datavaultkubernetesauthbackendconfig.DataVaultKubernetesAuthBackendConfig_IsTerr ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkubernetesauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesauthbackendconfig" datavaultkubernetesauthbackendconfig.DataVaultKubernetesAuthBackendConfig_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -795,7 +804,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkubernetesauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesauthbackendconfig" &datavaultkubernetesauthbackendconfig.DataVaultKubernetesAuthBackendConfigConfig { Connection: interface{}, diff --git a/docs/dataVaultKubernetesAuthBackendConfig.java.md b/docs/dataVaultKubernetesAuthBackendConfig.java.md index 99603368..04e78f90 100644 --- a/docs/dataVaultKubernetesAuthBackendConfig.java.md +++ b/docs/dataVaultKubernetesAuthBackendConfig.java.md @@ -221,6 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -295,6 +296,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultKubernetesAuthBackendConfig.python.md b/docs/dataVaultKubernetesAuthBackendConfig.python.md index b92873af..a269112c 100644 --- a/docs/dataVaultKubernetesAuthBackendConfig.python.md +++ b/docs/dataVaultKubernetesAuthBackendConfig.python.md @@ -217,6 +217,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -296,6 +297,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultKubernetesAuthBackendConfig.typescript.md b/docs/dataVaultKubernetesAuthBackendConfig.typescript.md index 4ddd7b5d..6c57fee5 100644 --- a/docs/dataVaultKubernetesAuthBackendConfig.typescript.md +++ b/docs/dataVaultKubernetesAuthBackendConfig.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -128,6 +129,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultKubernetesAuthBackendRole.csharp.md b/docs/dataVaultKubernetesAuthBackendRole.csharp.md index c1f9d9da..ceb4d5dc 100644 --- a/docs/dataVaultKubernetesAuthBackendRole.csharp.md +++ b/docs/dataVaultKubernetesAuthBackendRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -132,6 +133,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultKubernetesAuthBackendRole.go.md b/docs/dataVaultKubernetesAuthBackendRole.go.md index d4d502cd..765b18b6 100644 --- a/docs/dataVaultKubernetesAuthBackendRole.go.md +++ b/docs/dataVaultKubernetesAuthBackendRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkubernetesauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesauthbackendrole" datavaultkubernetesauthbackendrole.NewDataVaultKubernetesAuthBackendRole(scope Construct, id *string, config DataVaultKubernetesAuthBackendRoleConfig) DataVaultKubernetesAuthBackendRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -132,6 +133,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -358,7 +367,7 @@ func ResetTokenType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkubernetesauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesauthbackendrole" datavaultkubernetesauthbackendrole.DataVaultKubernetesAuthBackendRole_IsConstruct(x interface{}) *bool ``` @@ -390,7 +399,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkubernetesauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesauthbackendrole" datavaultkubernetesauthbackendrole.DataVaultKubernetesAuthBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -404,7 +413,7 @@ datavaultkubernetesauthbackendrole.DataVaultKubernetesAuthBackendRole_IsTerrafor ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkubernetesauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesauthbackendrole" datavaultkubernetesauthbackendrole.DataVaultKubernetesAuthBackendRole_IsTerraformDataSource(x interface{}) *bool ``` @@ -418,7 +427,7 @@ datavaultkubernetesauthbackendrole.DataVaultKubernetesAuthBackendRole_IsTerrafor ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkubernetesauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesauthbackendrole" datavaultkubernetesauthbackendrole.DataVaultKubernetesAuthBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -966,7 +975,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkubernetesauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesauthbackendrole" &datavaultkubernetesauthbackendrole.DataVaultKubernetesAuthBackendRoleConfig { Connection: interface{}, diff --git a/docs/dataVaultKubernetesAuthBackendRole.java.md b/docs/dataVaultKubernetesAuthBackendRole.java.md index 65572753..c957dc68 100644 --- a/docs/dataVaultKubernetesAuthBackendRole.java.md +++ b/docs/dataVaultKubernetesAuthBackendRole.java.md @@ -278,6 +278,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -356,6 +357,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultKubernetesAuthBackendRole.python.md b/docs/dataVaultKubernetesAuthBackendRole.python.md index 7bb29e99..6141892c 100644 --- a/docs/dataVaultKubernetesAuthBackendRole.python.md +++ b/docs/dataVaultKubernetesAuthBackendRole.python.md @@ -275,6 +275,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -358,6 +359,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultKubernetesAuthBackendRole.typescript.md b/docs/dataVaultKubernetesAuthBackendRole.typescript.md index a3e3ddbe..c114606f 100644 --- a/docs/dataVaultKubernetesAuthBackendRole.typescript.md +++ b/docs/dataVaultKubernetesAuthBackendRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -132,6 +133,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultKubernetesServiceAccountToken.csharp.md b/docs/dataVaultKubernetesServiceAccountToken.csharp.md index 7a5d79f4..0eaf8008 100644 --- a/docs/dataVaultKubernetesServiceAccountToken.csharp.md +++ b/docs/dataVaultKubernetesServiceAccountToken.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -123,6 +124,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultKubernetesServiceAccountToken.go.md b/docs/dataVaultKubernetesServiceAccountToken.go.md index 17a132e1..9133071f 100644 --- a/docs/dataVaultKubernetesServiceAccountToken.go.md +++ b/docs/dataVaultKubernetesServiceAccountToken.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkubernetesserviceaccounttoken" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesserviceaccounttoken" datavaultkubernetesserviceaccounttoken.NewDataVaultKubernetesServiceAccountToken(scope Construct, id *string, config DataVaultKubernetesServiceAccountTokenConfig) DataVaultKubernetesServiceAccountToken ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -123,6 +124,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -295,7 +304,7 @@ func ResetTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkubernetesserviceaccounttoken" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesserviceaccounttoken" datavaultkubernetesserviceaccounttoken.DataVaultKubernetesServiceAccountToken_IsConstruct(x interface{}) *bool ``` @@ -327,7 +336,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkubernetesserviceaccounttoken" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesserviceaccounttoken" datavaultkubernetesserviceaccounttoken.DataVaultKubernetesServiceAccountToken_IsTerraformElement(x interface{}) *bool ``` @@ -341,7 +350,7 @@ datavaultkubernetesserviceaccounttoken.DataVaultKubernetesServiceAccountToken_Is ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkubernetesserviceaccounttoken" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesserviceaccounttoken" datavaultkubernetesserviceaccounttoken.DataVaultKubernetesServiceAccountToken_IsTerraformDataSource(x interface{}) *bool ``` @@ -355,7 +364,7 @@ datavaultkubernetesserviceaccounttoken.DataVaultKubernetesServiceAccountToken_Is ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkubernetesserviceaccounttoken" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesserviceaccounttoken" datavaultkubernetesserviceaccounttoken.DataVaultKubernetesServiceAccountToken_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -782,7 +791,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkubernetesserviceaccounttoken" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesserviceaccounttoken" &datavaultkubernetesserviceaccounttoken.DataVaultKubernetesServiceAccountTokenConfig { Connection: interface{}, diff --git a/docs/dataVaultKubernetesServiceAccountToken.java.md b/docs/dataVaultKubernetesServiceAccountToken.java.md index c62630eb..ccf62fc1 100644 --- a/docs/dataVaultKubernetesServiceAccountToken.java.md +++ b/docs/dataVaultKubernetesServiceAccountToken.java.md @@ -194,6 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -263,6 +264,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultKubernetesServiceAccountToken.python.md b/docs/dataVaultKubernetesServiceAccountToken.python.md index 267cf1da..84a4bf0b 100644 --- a/docs/dataVaultKubernetesServiceAccountToken.python.md +++ b/docs/dataVaultKubernetesServiceAccountToken.python.md @@ -191,6 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -265,6 +266,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultKubernetesServiceAccountToken.typescript.md b/docs/dataVaultKubernetesServiceAccountToken.typescript.md index 48e80e12..38ee94b0 100644 --- a/docs/dataVaultKubernetesServiceAccountToken.typescript.md +++ b/docs/dataVaultKubernetesServiceAccountToken.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -123,6 +124,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultKvSecret.csharp.md b/docs/dataVaultKvSecret.csharp.md index ea70d101..5424e3e7 100644 --- a/docs/dataVaultKvSecret.csharp.md +++ b/docs/dataVaultKvSecret.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultKvSecret.go.md b/docs/dataVaultKvSecret.go.md index 8801ee85..d41c98b5 100644 --- a/docs/dataVaultKvSecret.go.md +++ b/docs/dataVaultKvSecret.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecret" datavaultkvsecret.NewDataVaultKvSecret(scope Construct, id *string, config DataVaultKvSecretConfig) DataVaultKvSecret ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -281,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecret" datavaultkvsecret.DataVaultKvSecret_IsConstruct(x interface{}) *bool ``` @@ -313,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecret" datavaultkvsecret.DataVaultKvSecret_IsTerraformElement(x interface{}) *bool ``` @@ -327,7 +336,7 @@ datavaultkvsecret.DataVaultKvSecret_IsTerraformElement(x interface{}) *bool ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecret" datavaultkvsecret.DataVaultKvSecret_IsTerraformDataSource(x interface{}) *bool ``` @@ -341,7 +350,7 @@ datavaultkvsecret.DataVaultKvSecret_IsTerraformDataSource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecret" datavaultkvsecret.DataVaultKvSecret_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -669,7 +678,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecret" &datavaultkvsecret.DataVaultKvSecretConfig { Connection: interface{}, diff --git a/docs/dataVaultKvSecret.java.md b/docs/dataVaultKvSecret.java.md index 2b7abe16..186e03b9 100644 --- a/docs/dataVaultKvSecret.java.md +++ b/docs/dataVaultKvSecret.java.md @@ -145,6 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -212,6 +213,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultKvSecret.python.md b/docs/dataVaultKvSecret.python.md index 143a6f97..46b1616f 100644 --- a/docs/dataVaultKvSecret.python.md +++ b/docs/dataVaultKvSecret.python.md @@ -143,6 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -215,6 +216,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultKvSecret.typescript.md b/docs/dataVaultKvSecret.typescript.md index 79953c44..607f49d1 100644 --- a/docs/dataVaultKvSecret.typescript.md +++ b/docs/dataVaultKvSecret.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultKvSecretSubkeysV2.csharp.md b/docs/dataVaultKvSecretSubkeysV2.csharp.md index a3e6609f..5c3cf730 100644 --- a/docs/dataVaultKvSecretSubkeysV2.csharp.md +++ b/docs/dataVaultKvSecretSubkeysV2.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -123,6 +124,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultKvSecretSubkeysV2.go.md b/docs/dataVaultKvSecretSubkeysV2.go.md index c2ea93a8..e901f48f 100644 --- a/docs/dataVaultKvSecretSubkeysV2.go.md +++ b/docs/dataVaultKvSecretSubkeysV2.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecretsubkeysv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretsubkeysv2" datavaultkvsecretsubkeysv2.NewDataVaultKvSecretSubkeysV2(scope Construct, id *string, config DataVaultKvSecretSubkeysV2Config) DataVaultKvSecretSubkeysV2 ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -123,6 +124,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -295,7 +304,7 @@ func ResetVersion() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecretsubkeysv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretsubkeysv2" datavaultkvsecretsubkeysv2.DataVaultKvSecretSubkeysV2_IsConstruct(x interface{}) *bool ``` @@ -327,7 +336,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecretsubkeysv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretsubkeysv2" datavaultkvsecretsubkeysv2.DataVaultKvSecretSubkeysV2_IsTerraformElement(x interface{}) *bool ``` @@ -341,7 +350,7 @@ datavaultkvsecretsubkeysv2.DataVaultKvSecretSubkeysV2_IsTerraformElement(x inter ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecretsubkeysv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretsubkeysv2" datavaultkvsecretsubkeysv2.DataVaultKvSecretSubkeysV2_IsTerraformDataSource(x interface{}) *bool ``` @@ -355,7 +364,7 @@ datavaultkvsecretsubkeysv2.DataVaultKvSecretSubkeysV2_IsTerraformDataSource(x in ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecretsubkeysv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretsubkeysv2" datavaultkvsecretsubkeysv2.DataVaultKvSecretSubkeysV2_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -727,7 +736,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecretsubkeysv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretsubkeysv2" &datavaultkvsecretsubkeysv2.DataVaultKvSecretSubkeysV2Config { Connection: interface{}, diff --git a/docs/dataVaultKvSecretSubkeysV2.java.md b/docs/dataVaultKvSecretSubkeysV2.java.md index 69b86477..ea7f5263 100644 --- a/docs/dataVaultKvSecretSubkeysV2.java.md +++ b/docs/dataVaultKvSecretSubkeysV2.java.md @@ -183,6 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -252,6 +253,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultKvSecretSubkeysV2.python.md b/docs/dataVaultKvSecretSubkeysV2.python.md index d2006ad4..ebebca62 100644 --- a/docs/dataVaultKvSecretSubkeysV2.python.md +++ b/docs/dataVaultKvSecretSubkeysV2.python.md @@ -181,6 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -255,6 +256,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultKvSecretSubkeysV2.typescript.md b/docs/dataVaultKvSecretSubkeysV2.typescript.md index 9eba9c4c..cffb4c1a 100644 --- a/docs/dataVaultKvSecretSubkeysV2.typescript.md +++ b/docs/dataVaultKvSecretSubkeysV2.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -123,6 +124,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultKvSecretV2.csharp.md b/docs/dataVaultKvSecretV2.csharp.md index 3eda5370..31100ff5 100644 --- a/docs/dataVaultKvSecretV2.csharp.md +++ b/docs/dataVaultKvSecretV2.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -122,6 +123,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultKvSecretV2.go.md b/docs/dataVaultKvSecretV2.go.md index 676da2f3..0decd311 100644 --- a/docs/dataVaultKvSecretV2.go.md +++ b/docs/dataVaultKvSecretV2.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecretv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretv2" datavaultkvsecretv2.NewDataVaultKvSecretV2(scope Construct, id *string, config DataVaultKvSecretV2Config) DataVaultKvSecretV2 ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -122,6 +123,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -288,7 +297,7 @@ func ResetVersion() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecretv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretv2" datavaultkvsecretv2.DataVaultKvSecretV2_IsConstruct(x interface{}) *bool ``` @@ -320,7 +329,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecretv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretv2" datavaultkvsecretv2.DataVaultKvSecretV2_IsTerraformElement(x interface{}) *bool ``` @@ -334,7 +343,7 @@ datavaultkvsecretv2.DataVaultKvSecretV2_IsTerraformElement(x interface{}) *bool ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecretv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretv2" datavaultkvsecretv2.DataVaultKvSecretV2_IsTerraformDataSource(x interface{}) *bool ``` @@ -348,7 +357,7 @@ datavaultkvsecretv2.DataVaultKvSecretV2_IsTerraformDataSource(x interface{}) *bo ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecretv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretv2" datavaultkvsecretv2.DataVaultKvSecretV2_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -742,7 +751,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecretv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretv2" &datavaultkvsecretv2.DataVaultKvSecretV2Config { Connection: interface{}, diff --git a/docs/dataVaultKvSecretV2.java.md b/docs/dataVaultKvSecretV2.java.md index 899c3507..e730dbdc 100644 --- a/docs/dataVaultKvSecretV2.java.md +++ b/docs/dataVaultKvSecretV2.java.md @@ -171,6 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -239,6 +240,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultKvSecretV2.python.md b/docs/dataVaultKvSecretV2.python.md index 681b0340..9f893084 100644 --- a/docs/dataVaultKvSecretV2.python.md +++ b/docs/dataVaultKvSecretV2.python.md @@ -169,6 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -242,6 +243,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultKvSecretV2.typescript.md b/docs/dataVaultKvSecretV2.typescript.md index 02e18cd1..7cd3d324 100644 --- a/docs/dataVaultKvSecretV2.typescript.md +++ b/docs/dataVaultKvSecretV2.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -122,6 +123,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultKvSecretsList.csharp.md b/docs/dataVaultKvSecretsList.csharp.md index 5e691453..a132fd06 100644 --- a/docs/dataVaultKvSecretsList.csharp.md +++ b/docs/dataVaultKvSecretsList.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultKvSecretsList.go.md b/docs/dataVaultKvSecretsList.go.md index 2bdd6d18..843acbea 100644 --- a/docs/dataVaultKvSecretsList.go.md +++ b/docs/dataVaultKvSecretsList.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecretslist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretslist" datavaultkvsecretslist.NewDataVaultKvSecretsList(scope Construct, id *string, config DataVaultKvSecretsListConfig) DataVaultKvSecretsList ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -281,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecretslist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretslist" datavaultkvsecretslist.DataVaultKvSecretsList_IsConstruct(x interface{}) *bool ``` @@ -313,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecretslist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretslist" datavaultkvsecretslist.DataVaultKvSecretsList_IsTerraformElement(x interface{}) *bool ``` @@ -327,7 +336,7 @@ datavaultkvsecretslist.DataVaultKvSecretsList_IsTerraformElement(x interface{}) ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecretslist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretslist" datavaultkvsecretslist.DataVaultKvSecretsList_IsTerraformDataSource(x interface{}) *bool ``` @@ -341,7 +350,7 @@ datavaultkvsecretslist.DataVaultKvSecretsList_IsTerraformDataSource(x interface{ ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecretslist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretslist" datavaultkvsecretslist.DataVaultKvSecretsList_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -625,7 +634,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecretslist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretslist" &datavaultkvsecretslist.DataVaultKvSecretsListConfig { Connection: interface{}, diff --git a/docs/dataVaultKvSecretsList.java.md b/docs/dataVaultKvSecretsList.java.md index 51f012f2..affee534 100644 --- a/docs/dataVaultKvSecretsList.java.md +++ b/docs/dataVaultKvSecretsList.java.md @@ -145,6 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -212,6 +213,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultKvSecretsList.python.md b/docs/dataVaultKvSecretsList.python.md index 1b7976ef..c8b64634 100644 --- a/docs/dataVaultKvSecretsList.python.md +++ b/docs/dataVaultKvSecretsList.python.md @@ -143,6 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -215,6 +216,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultKvSecretsList.typescript.md b/docs/dataVaultKvSecretsList.typescript.md index 5181e9b4..76d0c0e0 100644 --- a/docs/dataVaultKvSecretsList.typescript.md +++ b/docs/dataVaultKvSecretsList.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultKvSecretsListV2.csharp.md b/docs/dataVaultKvSecretsListV2.csharp.md index 13874d44..95526e7e 100644 --- a/docs/dataVaultKvSecretsListV2.csharp.md +++ b/docs/dataVaultKvSecretsListV2.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -122,6 +123,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultKvSecretsListV2.go.md b/docs/dataVaultKvSecretsListV2.go.md index 4e70c9e0..207be247 100644 --- a/docs/dataVaultKvSecretsListV2.go.md +++ b/docs/dataVaultKvSecretsListV2.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecretslistv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretslistv2" datavaultkvsecretslistv2.NewDataVaultKvSecretsListV2(scope Construct, id *string, config DataVaultKvSecretsListV2Config) DataVaultKvSecretsListV2 ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -122,6 +123,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -288,7 +297,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecretslistv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretslistv2" datavaultkvsecretslistv2.DataVaultKvSecretsListV2_IsConstruct(x interface{}) *bool ``` @@ -320,7 +329,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecretslistv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretslistv2" datavaultkvsecretslistv2.DataVaultKvSecretsListV2_IsTerraformElement(x interface{}) *bool ``` @@ -334,7 +343,7 @@ datavaultkvsecretslistv2.DataVaultKvSecretsListV2_IsTerraformElement(x interface ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecretslistv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretslistv2" datavaultkvsecretslistv2.DataVaultKvSecretsListV2_IsTerraformDataSource(x interface{}) *bool ``` @@ -348,7 +357,7 @@ datavaultkvsecretslistv2.DataVaultKvSecretsListV2_IsTerraformDataSource(x interf ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecretslistv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretslistv2" datavaultkvsecretslistv2.DataVaultKvSecretsListV2_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -665,7 +674,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultkvsecretslistv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretslistv2" &datavaultkvsecretslistv2.DataVaultKvSecretsListV2Config { Connection: interface{}, diff --git a/docs/dataVaultKvSecretsListV2.java.md b/docs/dataVaultKvSecretsListV2.java.md index 50114ec8..e4c55de0 100644 --- a/docs/dataVaultKvSecretsListV2.java.md +++ b/docs/dataVaultKvSecretsListV2.java.md @@ -159,6 +159,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -227,6 +228,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultKvSecretsListV2.python.md b/docs/dataVaultKvSecretsListV2.python.md index 52bdfb66..6cc74390 100644 --- a/docs/dataVaultKvSecretsListV2.python.md +++ b/docs/dataVaultKvSecretsListV2.python.md @@ -157,6 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -230,6 +231,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultKvSecretsListV2.typescript.md b/docs/dataVaultKvSecretsListV2.typescript.md index 8f0082eb..d23a7ccc 100644 --- a/docs/dataVaultKvSecretsListV2.typescript.md +++ b/docs/dataVaultKvSecretsListV2.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -122,6 +123,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultLdapDynamicCredentials.csharp.md b/docs/dataVaultLdapDynamicCredentials.csharp.md index cfc15814..ca8b004d 100644 --- a/docs/dataVaultLdapDynamicCredentials.csharp.md +++ b/docs/dataVaultLdapDynamicCredentials.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultLdapDynamicCredentials.go.md b/docs/dataVaultLdapDynamicCredentials.go.md index df286c6b..62a9e766 100644 --- a/docs/dataVaultLdapDynamicCredentials.go.md +++ b/docs/dataVaultLdapDynamicCredentials.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultldapdynamiccredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultldapdynamiccredentials" datavaultldapdynamiccredentials.NewDataVaultLdapDynamicCredentials(scope Construct, id *string, config DataVaultLdapDynamicCredentialsConfig) DataVaultLdapDynamicCredentials ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -281,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultldapdynamiccredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultldapdynamiccredentials" datavaultldapdynamiccredentials.DataVaultLdapDynamicCredentials_IsConstruct(x interface{}) *bool ``` @@ -313,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultldapdynamiccredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultldapdynamiccredentials" datavaultldapdynamiccredentials.DataVaultLdapDynamicCredentials_IsTerraformElement(x interface{}) *bool ``` @@ -327,7 +336,7 @@ datavaultldapdynamiccredentials.DataVaultLdapDynamicCredentials_IsTerraformEleme ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultldapdynamiccredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultldapdynamiccredentials" datavaultldapdynamiccredentials.DataVaultLdapDynamicCredentials_IsTerraformDataSource(x interface{}) *bool ``` @@ -341,7 +350,7 @@ datavaultldapdynamiccredentials.DataVaultLdapDynamicCredentials_IsTerraformDataS ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultldapdynamiccredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultldapdynamiccredentials" datavaultldapdynamiccredentials.DataVaultLdapDynamicCredentials_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -702,7 +711,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultldapdynamiccredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultldapdynamiccredentials" &datavaultldapdynamiccredentials.DataVaultLdapDynamicCredentialsConfig { Connection: interface{}, diff --git a/docs/dataVaultLdapDynamicCredentials.java.md b/docs/dataVaultLdapDynamicCredentials.java.md index 03852a40..b4d09d73 100644 --- a/docs/dataVaultLdapDynamicCredentials.java.md +++ b/docs/dataVaultLdapDynamicCredentials.java.md @@ -157,6 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -224,6 +225,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultLdapDynamicCredentials.python.md b/docs/dataVaultLdapDynamicCredentials.python.md index a99cc680..0e7a7216 100644 --- a/docs/dataVaultLdapDynamicCredentials.python.md +++ b/docs/dataVaultLdapDynamicCredentials.python.md @@ -155,6 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -227,6 +228,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultLdapDynamicCredentials.typescript.md b/docs/dataVaultLdapDynamicCredentials.typescript.md index 9e75dc21..a963c53e 100644 --- a/docs/dataVaultLdapDynamicCredentials.typescript.md +++ b/docs/dataVaultLdapDynamicCredentials.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultLdapStaticCredentials.csharp.md b/docs/dataVaultLdapStaticCredentials.csharp.md index 6c208975..c4a3b1dc 100644 --- a/docs/dataVaultLdapStaticCredentials.csharp.md +++ b/docs/dataVaultLdapStaticCredentials.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultLdapStaticCredentials.go.md b/docs/dataVaultLdapStaticCredentials.go.md index 734644a3..33d4b620 100644 --- a/docs/dataVaultLdapStaticCredentials.go.md +++ b/docs/dataVaultLdapStaticCredentials.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultldapstaticcredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultldapstaticcredentials" datavaultldapstaticcredentials.NewDataVaultLdapStaticCredentials(scope Construct, id *string, config DataVaultLdapStaticCredentialsConfig) DataVaultLdapStaticCredentials ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -281,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultldapstaticcredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultldapstaticcredentials" datavaultldapstaticcredentials.DataVaultLdapStaticCredentials_IsConstruct(x interface{}) *bool ``` @@ -313,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultldapstaticcredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultldapstaticcredentials" datavaultldapstaticcredentials.DataVaultLdapStaticCredentials_IsTerraformElement(x interface{}) *bool ``` @@ -327,7 +336,7 @@ datavaultldapstaticcredentials.DataVaultLdapStaticCredentials_IsTerraformElement ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultldapstaticcredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultldapstaticcredentials" datavaultldapstaticcredentials.DataVaultLdapStaticCredentials_IsTerraformDataSource(x interface{}) *bool ``` @@ -341,7 +350,7 @@ datavaultldapstaticcredentials.DataVaultLdapStaticCredentials_IsTerraformDataSou ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultldapstaticcredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultldapstaticcredentials" datavaultldapstaticcredentials.DataVaultLdapStaticCredentials_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -713,7 +722,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultldapstaticcredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultldapstaticcredentials" &datavaultldapstaticcredentials.DataVaultLdapStaticCredentialsConfig { Connection: interface{}, diff --git a/docs/dataVaultLdapStaticCredentials.java.md b/docs/dataVaultLdapStaticCredentials.java.md index e386fcac..619c17ea 100644 --- a/docs/dataVaultLdapStaticCredentials.java.md +++ b/docs/dataVaultLdapStaticCredentials.java.md @@ -157,6 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -224,6 +225,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultLdapStaticCredentials.python.md b/docs/dataVaultLdapStaticCredentials.python.md index d6066510..5ec9cbf6 100644 --- a/docs/dataVaultLdapStaticCredentials.python.md +++ b/docs/dataVaultLdapStaticCredentials.python.md @@ -155,6 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -227,6 +228,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultLdapStaticCredentials.typescript.md b/docs/dataVaultLdapStaticCredentials.typescript.md index df255a73..1cbfc02f 100644 --- a/docs/dataVaultLdapStaticCredentials.typescript.md +++ b/docs/dataVaultLdapStaticCredentials.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultNomadAccessToken.csharp.md b/docs/dataVaultNomadAccessToken.csharp.md index bbeacd61..21e762d0 100644 --- a/docs/dataVaultNomadAccessToken.csharp.md +++ b/docs/dataVaultNomadAccessToken.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultNomadAccessToken.go.md b/docs/dataVaultNomadAccessToken.go.md index 8c8981f6..1a1f30ec 100644 --- a/docs/dataVaultNomadAccessToken.go.md +++ b/docs/dataVaultNomadAccessToken.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultnomadaccesstoken" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultnomadaccesstoken" datavaultnomadaccesstoken.NewDataVaultNomadAccessToken(scope Construct, id *string, config DataVaultNomadAccessTokenConfig) DataVaultNomadAccessToken ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -281,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultnomadaccesstoken" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultnomadaccesstoken" datavaultnomadaccesstoken.DataVaultNomadAccessToken_IsConstruct(x interface{}) *bool ``` @@ -313,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultnomadaccesstoken" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultnomadaccesstoken" datavaultnomadaccesstoken.DataVaultNomadAccessToken_IsTerraformElement(x interface{}) *bool ``` @@ -327,7 +336,7 @@ datavaultnomadaccesstoken.DataVaultNomadAccessToken_IsTerraformElement(x interfa ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultnomadaccesstoken" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultnomadaccesstoken" datavaultnomadaccesstoken.DataVaultNomadAccessToken_IsTerraformDataSource(x interface{}) *bool ``` @@ -341,7 +350,7 @@ datavaultnomadaccesstoken.DataVaultNomadAccessToken_IsTerraformDataSource(x inte ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultnomadaccesstoken" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultnomadaccesstoken" datavaultnomadaccesstoken.DataVaultNomadAccessToken_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -658,7 +667,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultnomadaccesstoken" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultnomadaccesstoken" &datavaultnomadaccesstoken.DataVaultNomadAccessTokenConfig { Connection: interface{}, diff --git a/docs/dataVaultNomadAccessToken.java.md b/docs/dataVaultNomadAccessToken.java.md index b211c5f0..2eba552c 100644 --- a/docs/dataVaultNomadAccessToken.java.md +++ b/docs/dataVaultNomadAccessToken.java.md @@ -157,6 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -224,6 +225,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultNomadAccessToken.python.md b/docs/dataVaultNomadAccessToken.python.md index 1bad2da9..04a69f92 100644 --- a/docs/dataVaultNomadAccessToken.python.md +++ b/docs/dataVaultNomadAccessToken.python.md @@ -155,6 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -227,6 +228,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultNomadAccessToken.typescript.md b/docs/dataVaultNomadAccessToken.typescript.md index 06288b99..32979551 100644 --- a/docs/dataVaultNomadAccessToken.typescript.md +++ b/docs/dataVaultNomadAccessToken.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultPkiSecretBackendIssuer.csharp.md b/docs/dataVaultPkiSecretBackendIssuer.csharp.md index 4b668119..052d02af 100644 --- a/docs/dataVaultPkiSecretBackendIssuer.csharp.md +++ b/docs/dataVaultPkiSecretBackendIssuer.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultPkiSecretBackendIssuer.go.md b/docs/dataVaultPkiSecretBackendIssuer.go.md index 343b3c8d..bf3c140e 100644 --- a/docs/dataVaultPkiSecretBackendIssuer.go.md +++ b/docs/dataVaultPkiSecretBackendIssuer.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpkisecretbackendissuer" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendissuer" datavaultpkisecretbackendissuer.NewDataVaultPkiSecretBackendIssuer(scope Construct, id *string, config DataVaultPkiSecretBackendIssuerConfig) DataVaultPkiSecretBackendIssuer ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -281,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpkisecretbackendissuer" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendissuer" datavaultpkisecretbackendissuer.DataVaultPkiSecretBackendIssuer_IsConstruct(x interface{}) *bool ``` @@ -313,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpkisecretbackendissuer" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendissuer" datavaultpkisecretbackendissuer.DataVaultPkiSecretBackendIssuer_IsTerraformElement(x interface{}) *bool ``` @@ -327,7 +336,7 @@ datavaultpkisecretbackendissuer.DataVaultPkiSecretBackendIssuer_IsTerraformEleme ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpkisecretbackendissuer" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendissuer" datavaultpkisecretbackendissuer.DataVaultPkiSecretBackendIssuer_IsTerraformDataSource(x interface{}) *bool ``` @@ -341,7 +350,7 @@ datavaultpkisecretbackendissuer.DataVaultPkiSecretBackendIssuer_IsTerraformDataS ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpkisecretbackendissuer" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendissuer" datavaultpkisecretbackendissuer.DataVaultPkiSecretBackendIssuer_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -724,7 +733,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpkisecretbackendissuer" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendissuer" &datavaultpkisecretbackendissuer.DataVaultPkiSecretBackendIssuerConfig { Connection: interface{}, diff --git a/docs/dataVaultPkiSecretBackendIssuer.java.md b/docs/dataVaultPkiSecretBackendIssuer.java.md index 4e63af42..acecac24 100644 --- a/docs/dataVaultPkiSecretBackendIssuer.java.md +++ b/docs/dataVaultPkiSecretBackendIssuer.java.md @@ -157,6 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -224,6 +225,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultPkiSecretBackendIssuer.python.md b/docs/dataVaultPkiSecretBackendIssuer.python.md index ae669fef..0f9aabec 100644 --- a/docs/dataVaultPkiSecretBackendIssuer.python.md +++ b/docs/dataVaultPkiSecretBackendIssuer.python.md @@ -155,6 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -227,6 +228,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultPkiSecretBackendIssuer.typescript.md b/docs/dataVaultPkiSecretBackendIssuer.typescript.md index e74d7477..26bdfc62 100644 --- a/docs/dataVaultPkiSecretBackendIssuer.typescript.md +++ b/docs/dataVaultPkiSecretBackendIssuer.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultPkiSecretBackendIssuers.csharp.md b/docs/dataVaultPkiSecretBackendIssuers.csharp.md index 69e5a998..e3a7d393 100644 --- a/docs/dataVaultPkiSecretBackendIssuers.csharp.md +++ b/docs/dataVaultPkiSecretBackendIssuers.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultPkiSecretBackendIssuers.go.md b/docs/dataVaultPkiSecretBackendIssuers.go.md index 6e4d76ef..68ab926c 100644 --- a/docs/dataVaultPkiSecretBackendIssuers.go.md +++ b/docs/dataVaultPkiSecretBackendIssuers.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpkisecretbackendissuers" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendissuers" datavaultpkisecretbackendissuers.NewDataVaultPkiSecretBackendIssuers(scope Construct, id *string, config DataVaultPkiSecretBackendIssuersConfig) DataVaultPkiSecretBackendIssuers ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -281,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpkisecretbackendissuers" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendissuers" datavaultpkisecretbackendissuers.DataVaultPkiSecretBackendIssuers_IsConstruct(x interface{}) *bool ``` @@ -313,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpkisecretbackendissuers" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendissuers" datavaultpkisecretbackendissuers.DataVaultPkiSecretBackendIssuers_IsTerraformElement(x interface{}) *bool ``` @@ -327,7 +336,7 @@ datavaultpkisecretbackendissuers.DataVaultPkiSecretBackendIssuers_IsTerraformEle ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpkisecretbackendissuers" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendissuers" datavaultpkisecretbackendissuers.DataVaultPkiSecretBackendIssuers_IsTerraformDataSource(x interface{}) *bool ``` @@ -341,7 +350,7 @@ datavaultpkisecretbackendissuers.DataVaultPkiSecretBackendIssuers_IsTerraformDat ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpkisecretbackendissuers" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendissuers" datavaultpkisecretbackendissuers.DataVaultPkiSecretBackendIssuers_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -647,7 +656,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpkisecretbackendissuers" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendissuers" &datavaultpkisecretbackendissuers.DataVaultPkiSecretBackendIssuersConfig { Connection: interface{}, diff --git a/docs/dataVaultPkiSecretBackendIssuers.java.md b/docs/dataVaultPkiSecretBackendIssuers.java.md index fc2a8003..ca101e11 100644 --- a/docs/dataVaultPkiSecretBackendIssuers.java.md +++ b/docs/dataVaultPkiSecretBackendIssuers.java.md @@ -145,6 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -212,6 +213,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultPkiSecretBackendIssuers.python.md b/docs/dataVaultPkiSecretBackendIssuers.python.md index c0429ccc..3ce76021 100644 --- a/docs/dataVaultPkiSecretBackendIssuers.python.md +++ b/docs/dataVaultPkiSecretBackendIssuers.python.md @@ -143,6 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -215,6 +216,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultPkiSecretBackendIssuers.typescript.md b/docs/dataVaultPkiSecretBackendIssuers.typescript.md index 7074bdaf..0c8b8bfb 100644 --- a/docs/dataVaultPkiSecretBackendIssuers.typescript.md +++ b/docs/dataVaultPkiSecretBackendIssuers.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultPkiSecretBackendKey.csharp.md b/docs/dataVaultPkiSecretBackendKey.csharp.md index d7f7a562..66e2314f 100644 --- a/docs/dataVaultPkiSecretBackendKey.csharp.md +++ b/docs/dataVaultPkiSecretBackendKey.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultPkiSecretBackendKey.go.md b/docs/dataVaultPkiSecretBackendKey.go.md index fea2ade7..629bbc27 100644 --- a/docs/dataVaultPkiSecretBackendKey.go.md +++ b/docs/dataVaultPkiSecretBackendKey.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpkisecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendkey" datavaultpkisecretbackendkey.NewDataVaultPkiSecretBackendKey(scope Construct, id *string, config DataVaultPkiSecretBackendKeyConfig) DataVaultPkiSecretBackendKey ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -281,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpkisecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendkey" datavaultpkisecretbackendkey.DataVaultPkiSecretBackendKey_IsConstruct(x interface{}) *bool ``` @@ -313,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpkisecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendkey" datavaultpkisecretbackendkey.DataVaultPkiSecretBackendKey_IsTerraformElement(x interface{}) *bool ``` @@ -327,7 +336,7 @@ datavaultpkisecretbackendkey.DataVaultPkiSecretBackendKey_IsTerraformElement(x i ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpkisecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendkey" datavaultpkisecretbackendkey.DataVaultPkiSecretBackendKey_IsTerraformDataSource(x interface{}) *bool ``` @@ -341,7 +350,7 @@ datavaultpkisecretbackendkey.DataVaultPkiSecretBackendKey_IsTerraformDataSource( ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpkisecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendkey" datavaultpkisecretbackendkey.DataVaultPkiSecretBackendKey_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -669,7 +678,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpkisecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendkey" &datavaultpkisecretbackendkey.DataVaultPkiSecretBackendKeyConfig { Connection: interface{}, diff --git a/docs/dataVaultPkiSecretBackendKey.java.md b/docs/dataVaultPkiSecretBackendKey.java.md index 45a1ac8e..29bd267c 100644 --- a/docs/dataVaultPkiSecretBackendKey.java.md +++ b/docs/dataVaultPkiSecretBackendKey.java.md @@ -157,6 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -224,6 +225,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultPkiSecretBackendKey.python.md b/docs/dataVaultPkiSecretBackendKey.python.md index 216a8e28..7c982846 100644 --- a/docs/dataVaultPkiSecretBackendKey.python.md +++ b/docs/dataVaultPkiSecretBackendKey.python.md @@ -155,6 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -227,6 +228,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultPkiSecretBackendKey.typescript.md b/docs/dataVaultPkiSecretBackendKey.typescript.md index 61754c98..3e2194b4 100644 --- a/docs/dataVaultPkiSecretBackendKey.typescript.md +++ b/docs/dataVaultPkiSecretBackendKey.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultPkiSecretBackendKeys.csharp.md b/docs/dataVaultPkiSecretBackendKeys.csharp.md index 0a62663f..81c8b892 100644 --- a/docs/dataVaultPkiSecretBackendKeys.csharp.md +++ b/docs/dataVaultPkiSecretBackendKeys.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultPkiSecretBackendKeys.go.md b/docs/dataVaultPkiSecretBackendKeys.go.md index 325b9f76..5749401c 100644 --- a/docs/dataVaultPkiSecretBackendKeys.go.md +++ b/docs/dataVaultPkiSecretBackendKeys.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpkisecretbackendkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendkeys" datavaultpkisecretbackendkeys.NewDataVaultPkiSecretBackendKeys(scope Construct, id *string, config DataVaultPkiSecretBackendKeysConfig) DataVaultPkiSecretBackendKeys ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -281,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpkisecretbackendkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendkeys" datavaultpkisecretbackendkeys.DataVaultPkiSecretBackendKeys_IsConstruct(x interface{}) *bool ``` @@ -313,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpkisecretbackendkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendkeys" datavaultpkisecretbackendkeys.DataVaultPkiSecretBackendKeys_IsTerraformElement(x interface{}) *bool ``` @@ -327,7 +336,7 @@ datavaultpkisecretbackendkeys.DataVaultPkiSecretBackendKeys_IsTerraformElement(x ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpkisecretbackendkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendkeys" datavaultpkisecretbackendkeys.DataVaultPkiSecretBackendKeys_IsTerraformDataSource(x interface{}) *bool ``` @@ -341,7 +350,7 @@ datavaultpkisecretbackendkeys.DataVaultPkiSecretBackendKeys_IsTerraformDataSourc ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpkisecretbackendkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendkeys" datavaultpkisecretbackendkeys.DataVaultPkiSecretBackendKeys_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -647,7 +656,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpkisecretbackendkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendkeys" &datavaultpkisecretbackendkeys.DataVaultPkiSecretBackendKeysConfig { Connection: interface{}, diff --git a/docs/dataVaultPkiSecretBackendKeys.java.md b/docs/dataVaultPkiSecretBackendKeys.java.md index 7680f866..1fabef84 100644 --- a/docs/dataVaultPkiSecretBackendKeys.java.md +++ b/docs/dataVaultPkiSecretBackendKeys.java.md @@ -145,6 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -212,6 +213,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultPkiSecretBackendKeys.python.md b/docs/dataVaultPkiSecretBackendKeys.python.md index 4c58a096..1856664d 100644 --- a/docs/dataVaultPkiSecretBackendKeys.python.md +++ b/docs/dataVaultPkiSecretBackendKeys.python.md @@ -143,6 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -215,6 +216,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultPkiSecretBackendKeys.typescript.md b/docs/dataVaultPkiSecretBackendKeys.typescript.md index 7fae9770..97f575f4 100644 --- a/docs/dataVaultPkiSecretBackendKeys.typescript.md +++ b/docs/dataVaultPkiSecretBackendKeys.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultPolicyDocument.csharp.md b/docs/dataVaultPolicyDocument.csharp.md index 2303e388..4eb07574 100644 --- a/docs/dataVaultPolicyDocument.csharp.md +++ b/docs/dataVaultPolicyDocument.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -123,6 +124,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp @@ -1065,6 +1074,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1072,6 +1082,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp @@ -1519,6 +1545,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1526,6 +1553,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp @@ -1973,6 +2016,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1980,6 +2024,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp diff --git a/docs/dataVaultPolicyDocument.go.md b/docs/dataVaultPolicyDocument.go.md index 4a46c873..c3319208 100644 --- a/docs/dataVaultPolicyDocument.go.md +++ b/docs/dataVaultPolicyDocument.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" datavaultpolicydocument.NewDataVaultPolicyDocument(scope Construct, id *string, config DataVaultPolicyDocumentConfig) DataVaultPolicyDocument ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -123,6 +124,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -301,7 +310,7 @@ func ResetRule() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" datavaultpolicydocument.DataVaultPolicyDocument_IsConstruct(x interface{}) *bool ``` @@ -333,7 +342,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" datavaultpolicydocument.DataVaultPolicyDocument_IsTerraformElement(x interface{}) *bool ``` @@ -347,7 +356,7 @@ datavaultpolicydocument.DataVaultPolicyDocument_IsTerraformElement(x interface{} ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" datavaultpolicydocument.DataVaultPolicyDocument_IsTerraformDataSource(x interface{}) *bool ``` @@ -361,7 +370,7 @@ datavaultpolicydocument.DataVaultPolicyDocument_IsTerraformDataSource(x interfac ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" datavaultpolicydocument.DataVaultPolicyDocument_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -645,7 +654,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" &datavaultpolicydocument.DataVaultPolicyDocumentConfig { Connection: interface{}, @@ -796,7 +805,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" &datavaultpolicydocument.DataVaultPolicyDocumentRule { Capabilities: *[]*string, @@ -930,7 +939,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" &datavaultpolicydocument.DataVaultPolicyDocumentRuleAllowedParameter { Key: *string, @@ -976,7 +985,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" &datavaultpolicydocument.DataVaultPolicyDocumentRuleDeniedParameter { Key: *string, @@ -1024,7 +1033,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" datavaultpolicydocument.NewDataVaultPolicyDocumentRuleAllowedParameterList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DataVaultPolicyDocumentRuleAllowedParameterList ``` @@ -1065,6 +1074,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1072,6 +1082,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -1167,7 +1193,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" datavaultpolicydocument.NewDataVaultPolicyDocumentRuleAllowedParameterOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DataVaultPolicyDocumentRuleAllowedParameterOutputReference ``` @@ -1478,7 +1504,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" datavaultpolicydocument.NewDataVaultPolicyDocumentRuleDeniedParameterList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DataVaultPolicyDocumentRuleDeniedParameterList ``` @@ -1519,6 +1545,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1526,6 +1553,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -1621,7 +1664,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" datavaultpolicydocument.NewDataVaultPolicyDocumentRuleDeniedParameterOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DataVaultPolicyDocumentRuleDeniedParameterOutputReference ``` @@ -1932,7 +1975,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" datavaultpolicydocument.NewDataVaultPolicyDocumentRuleList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DataVaultPolicyDocumentRuleList ``` @@ -1973,6 +2016,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1980,6 +2024,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -2075,7 +2135,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" datavaultpolicydocument.NewDataVaultPolicyDocumentRuleOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DataVaultPolicyDocumentRuleOutputReference ``` diff --git a/docs/dataVaultPolicyDocument.java.md b/docs/dataVaultPolicyDocument.java.md index 012f9848..58e99289 100644 --- a/docs/dataVaultPolicyDocument.java.md +++ b/docs/dataVaultPolicyDocument.java.md @@ -146,6 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -215,6 +216,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java @@ -1164,6 +1173,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -1171,6 +1181,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java @@ -1618,6 +1644,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -1625,6 +1652,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java @@ -2072,6 +2115,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -2079,6 +2123,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java diff --git a/docs/dataVaultPolicyDocument.python.md b/docs/dataVaultPolicyDocument.python.md index 94702c61..cf3b32bb 100644 --- a/docs/dataVaultPolicyDocument.python.md +++ b/docs/dataVaultPolicyDocument.python.md @@ -143,6 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -217,6 +218,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python @@ -1196,6 +1205,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -1203,6 +1213,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python @@ -1685,6 +1713,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -1692,6 +1721,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python @@ -2174,6 +2221,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -2181,6 +2229,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python diff --git a/docs/dataVaultPolicyDocument.typescript.md b/docs/dataVaultPolicyDocument.typescript.md index d93b1c50..c3cc49c0 100644 --- a/docs/dataVaultPolicyDocument.typescript.md +++ b/docs/dataVaultPolicyDocument.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -123,6 +124,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript @@ -1039,6 +1048,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -1046,6 +1056,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript @@ -1493,6 +1519,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -1500,6 +1527,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript @@ -1947,6 +1990,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -1954,6 +1998,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript diff --git a/docs/dataVaultRaftAutopilotState.csharp.md b/docs/dataVaultRaftAutopilotState.csharp.md index ff0959fd..aff8e896 100644 --- a/docs/dataVaultRaftAutopilotState.csharp.md +++ b/docs/dataVaultRaftAutopilotState.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultRaftAutopilotState.go.md b/docs/dataVaultRaftAutopilotState.go.md index 37299752..0cecfe05 100644 --- a/docs/dataVaultRaftAutopilotState.go.md +++ b/docs/dataVaultRaftAutopilotState.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultraftautopilotstate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultraftautopilotstate" datavaultraftautopilotstate.NewDataVaultRaftAutopilotState(scope Construct, id *string, config DataVaultRaftAutopilotStateConfig) DataVaultRaftAutopilotState ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -281,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultraftautopilotstate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultraftautopilotstate" datavaultraftautopilotstate.DataVaultRaftAutopilotState_IsConstruct(x interface{}) *bool ``` @@ -313,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultraftautopilotstate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultraftautopilotstate" datavaultraftautopilotstate.DataVaultRaftAutopilotState_IsTerraformElement(x interface{}) *bool ``` @@ -327,7 +336,7 @@ datavaultraftautopilotstate.DataVaultRaftAutopilotState_IsTerraformElement(x int ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultraftautopilotstate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultraftautopilotstate" datavaultraftautopilotstate.DataVaultRaftAutopilotState_IsTerraformDataSource(x interface{}) *bool ``` @@ -341,7 +350,7 @@ datavaultraftautopilotstate.DataVaultRaftAutopilotState_IsTerraformDataSource(x ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultraftautopilotstate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultraftautopilotstate" datavaultraftautopilotstate.DataVaultRaftAutopilotState_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -713,7 +722,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaultraftautopilotstate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultraftautopilotstate" &datavaultraftautopilotstate.DataVaultRaftAutopilotStateConfig { Connection: interface{}, diff --git a/docs/dataVaultRaftAutopilotState.java.md b/docs/dataVaultRaftAutopilotState.java.md index cebef2d3..0e90126d 100644 --- a/docs/dataVaultRaftAutopilotState.java.md +++ b/docs/dataVaultRaftAutopilotState.java.md @@ -133,6 +133,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -200,6 +201,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultRaftAutopilotState.python.md b/docs/dataVaultRaftAutopilotState.python.md index d33dde79..831188a5 100644 --- a/docs/dataVaultRaftAutopilotState.python.md +++ b/docs/dataVaultRaftAutopilotState.python.md @@ -131,6 +131,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -203,6 +204,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultRaftAutopilotState.typescript.md b/docs/dataVaultRaftAutopilotState.typescript.md index f5332ce3..e9671671 100644 --- a/docs/dataVaultRaftAutopilotState.typescript.md +++ b/docs/dataVaultRaftAutopilotState.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -121,6 +122,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultTransformDecode.csharp.md b/docs/dataVaultTransformDecode.csharp.md index c2bca10e..d97ab8b6 100644 --- a/docs/dataVaultTransformDecode.csharp.md +++ b/docs/dataVaultTransformDecode.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -127,6 +128,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultTransformDecode.go.md b/docs/dataVaultTransformDecode.go.md index 7a24d0b2..b1c5ee6f 100644 --- a/docs/dataVaultTransformDecode.go.md +++ b/docs/dataVaultTransformDecode.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaulttransformdecode" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransformdecode" datavaulttransformdecode.NewDataVaultTransformDecode(scope Construct, id *string, config DataVaultTransformDecodeConfig) DataVaultTransformDecode ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -127,6 +128,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -323,7 +332,7 @@ func ResetValue() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaulttransformdecode" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransformdecode" datavaulttransformdecode.DataVaultTransformDecode_IsConstruct(x interface{}) *bool ``` @@ -355,7 +364,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaulttransformdecode" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransformdecode" datavaulttransformdecode.DataVaultTransformDecode_IsTerraformElement(x interface{}) *bool ``` @@ -369,7 +378,7 @@ datavaulttransformdecode.DataVaultTransformDecode_IsTerraformElement(x interface ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaulttransformdecode" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransformdecode" datavaulttransformdecode.DataVaultTransformDecode_IsTerraformDataSource(x interface{}) *bool ``` @@ -383,7 +392,7 @@ datavaulttransformdecode.DataVaultTransformDecode_IsTerraformDataSource(x interf ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaulttransformdecode" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransformdecode" datavaulttransformdecode.DataVaultTransformDecode_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -810,7 +819,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaulttransformdecode" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransformdecode" &datavaulttransformdecode.DataVaultTransformDecodeConfig { Connection: interface{}, diff --git a/docs/dataVaultTransformDecode.java.md b/docs/dataVaultTransformDecode.java.md index 5c46e683..4527eaa3 100644 --- a/docs/dataVaultTransformDecode.java.md +++ b/docs/dataVaultTransformDecode.java.md @@ -235,6 +235,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -308,6 +309,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultTransformDecode.python.md b/docs/dataVaultTransformDecode.python.md index 754c9913..124f4ed5 100644 --- a/docs/dataVaultTransformDecode.python.md +++ b/docs/dataVaultTransformDecode.python.md @@ -231,6 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -309,6 +310,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultTransformDecode.typescript.md b/docs/dataVaultTransformDecode.typescript.md index 04cf00e9..b5a6c856 100644 --- a/docs/dataVaultTransformDecode.typescript.md +++ b/docs/dataVaultTransformDecode.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -127,6 +128,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultTransformEncode.csharp.md b/docs/dataVaultTransformEncode.csharp.md index 3c884944..59f1a99f 100644 --- a/docs/dataVaultTransformEncode.csharp.md +++ b/docs/dataVaultTransformEncode.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -127,6 +128,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultTransformEncode.go.md b/docs/dataVaultTransformEncode.go.md index 5209c221..bd2fa82f 100644 --- a/docs/dataVaultTransformEncode.go.md +++ b/docs/dataVaultTransformEncode.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaulttransformencode" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransformencode" datavaulttransformencode.NewDataVaultTransformEncode(scope Construct, id *string, config DataVaultTransformEncodeConfig) DataVaultTransformEncode ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -127,6 +128,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -323,7 +332,7 @@ func ResetValue() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaulttransformencode" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransformencode" datavaulttransformencode.DataVaultTransformEncode_IsConstruct(x interface{}) *bool ``` @@ -355,7 +364,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaulttransformencode" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransformencode" datavaulttransformencode.DataVaultTransformEncode_IsTerraformElement(x interface{}) *bool ``` @@ -369,7 +378,7 @@ datavaulttransformencode.DataVaultTransformEncode_IsTerraformElement(x interface ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaulttransformencode" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransformencode" datavaulttransformencode.DataVaultTransformEncode_IsTerraformDataSource(x interface{}) *bool ``` @@ -383,7 +392,7 @@ datavaulttransformencode.DataVaultTransformEncode_IsTerraformDataSource(x interf ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaulttransformencode" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransformencode" datavaulttransformencode.DataVaultTransformEncode_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -810,7 +819,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaulttransformencode" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransformencode" &datavaulttransformencode.DataVaultTransformEncodeConfig { Connection: interface{}, diff --git a/docs/dataVaultTransformEncode.java.md b/docs/dataVaultTransformEncode.java.md index 8111b3a2..7be4adcf 100644 --- a/docs/dataVaultTransformEncode.java.md +++ b/docs/dataVaultTransformEncode.java.md @@ -235,6 +235,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -308,6 +309,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultTransformEncode.python.md b/docs/dataVaultTransformEncode.python.md index a4a96d9b..38992da4 100644 --- a/docs/dataVaultTransformEncode.python.md +++ b/docs/dataVaultTransformEncode.python.md @@ -231,6 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -309,6 +310,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultTransformEncode.typescript.md b/docs/dataVaultTransformEncode.typescript.md index 074153ce..56b9bc1c 100644 --- a/docs/dataVaultTransformEncode.typescript.md +++ b/docs/dataVaultTransformEncode.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -127,6 +128,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultTransitDecrypt.csharp.md b/docs/dataVaultTransitDecrypt.csharp.md index f87c92d8..7c2226d3 100644 --- a/docs/dataVaultTransitDecrypt.csharp.md +++ b/docs/dataVaultTransitDecrypt.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -122,6 +123,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultTransitDecrypt.go.md b/docs/dataVaultTransitDecrypt.go.md index 4f4258da..2fc1c3fd 100644 --- a/docs/dataVaultTransitDecrypt.go.md +++ b/docs/dataVaultTransitDecrypt.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaulttransitdecrypt" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransitdecrypt" datavaulttransitdecrypt.NewDataVaultTransitDecrypt(scope Construct, id *string, config DataVaultTransitDecryptConfig) DataVaultTransitDecrypt ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -122,6 +123,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -288,7 +297,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaulttransitdecrypt" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransitdecrypt" datavaulttransitdecrypt.DataVaultTransitDecrypt_IsConstruct(x interface{}) *bool ``` @@ -320,7 +329,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaulttransitdecrypt" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransitdecrypt" datavaulttransitdecrypt.DataVaultTransitDecrypt_IsTerraformElement(x interface{}) *bool ``` @@ -334,7 +343,7 @@ datavaulttransitdecrypt.DataVaultTransitDecrypt_IsTerraformElement(x interface{} ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaulttransitdecrypt" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransitdecrypt" datavaulttransitdecrypt.DataVaultTransitDecrypt_IsTerraformDataSource(x interface{}) *bool ``` @@ -348,7 +357,7 @@ datavaulttransitdecrypt.DataVaultTransitDecrypt_IsTerraformDataSource(x interfac ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaulttransitdecrypt" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransitdecrypt" datavaulttransitdecrypt.DataVaultTransitDecrypt_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -698,7 +707,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaulttransitdecrypt" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransitdecrypt" &datavaulttransitdecrypt.DataVaultTransitDecryptConfig { Connection: interface{}, diff --git a/docs/dataVaultTransitDecrypt.java.md b/docs/dataVaultTransitDecrypt.java.md index 4e6b1959..0155c237 100644 --- a/docs/dataVaultTransitDecrypt.java.md +++ b/docs/dataVaultTransitDecrypt.java.md @@ -181,6 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -249,6 +250,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultTransitDecrypt.python.md b/docs/dataVaultTransitDecrypt.python.md index 6b603e22..f0a0b3e6 100644 --- a/docs/dataVaultTransitDecrypt.python.md +++ b/docs/dataVaultTransitDecrypt.python.md @@ -179,6 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -252,6 +253,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultTransitDecrypt.typescript.md b/docs/dataVaultTransitDecrypt.typescript.md index 5f9869e4..ad31b2f6 100644 --- a/docs/dataVaultTransitDecrypt.typescript.md +++ b/docs/dataVaultTransitDecrypt.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -122,6 +123,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/dataVaultTransitEncrypt.csharp.md b/docs/dataVaultTransitEncrypt.csharp.md index 2a48769f..7b51b0d4 100644 --- a/docs/dataVaultTransitEncrypt.csharp.md +++ b/docs/dataVaultTransitEncrypt.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -123,6 +124,14 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```csharp diff --git a/docs/dataVaultTransitEncrypt.go.md b/docs/dataVaultTransitEncrypt.go.md index a52c6df9..245acf13 100644 --- a/docs/dataVaultTransitEncrypt.go.md +++ b/docs/dataVaultTransitEncrypt.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaulttransitencrypt" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransitencrypt" datavaulttransitencrypt.NewDataVaultTransitEncrypt(scope Construct, id *string, config DataVaultTransitEncryptConfig) DataVaultTransitEncrypt ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | Adds this resource to the terraform JSON output. | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | GetAnyMapAttribute | *No description.* | @@ -123,6 +124,14 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + ##### `ToMetadata` ```go @@ -295,7 +304,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaulttransitencrypt" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransitencrypt" datavaulttransitencrypt.DataVaultTransitEncrypt_IsConstruct(x interface{}) *bool ``` @@ -327,7 +336,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaulttransitencrypt" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransitencrypt" datavaulttransitencrypt.DataVaultTransitEncrypt_IsTerraformElement(x interface{}) *bool ``` @@ -341,7 +350,7 @@ datavaulttransitencrypt.DataVaultTransitEncrypt_IsTerraformElement(x interface{} ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaulttransitencrypt" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransitencrypt" datavaulttransitencrypt.DataVaultTransitEncrypt_IsTerraformDataSource(x interface{}) *bool ``` @@ -355,7 +364,7 @@ datavaulttransitencrypt.DataVaultTransitEncrypt_IsTerraformDataSource(x interfac ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaulttransitencrypt" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransitencrypt" datavaulttransitencrypt.DataVaultTransitEncrypt_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -727,7 +736,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/datavaulttransitencrypt" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransitencrypt" &datavaulttransitencrypt.DataVaultTransitEncryptConfig { Connection: interface{}, diff --git a/docs/dataVaultTransitEncrypt.java.md b/docs/dataVaultTransitEncrypt.java.md index a63bd465..7c39d0e9 100644 --- a/docs/dataVaultTransitEncrypt.java.md +++ b/docs/dataVaultTransitEncrypt.java.md @@ -193,6 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -262,6 +263,14 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```java diff --git a/docs/dataVaultTransitEncrypt.python.md b/docs/dataVaultTransitEncrypt.python.md index df2ff333..33c19e3b 100644 --- a/docs/dataVaultTransitEncrypt.python.md +++ b/docs/dataVaultTransitEncrypt.python.md @@ -191,6 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | Adds this resource to the terraform JSON output. | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | get_any_map_attribute | *No description.* | @@ -265,6 +266,14 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + ##### `to_metadata` ```python diff --git a/docs/dataVaultTransitEncrypt.typescript.md b/docs/dataVaultTransitEncrypt.typescript.md index 81706f33..eeba7044 100644 --- a/docs/dataVaultTransitEncrypt.typescript.md +++ b/docs/dataVaultTransitEncrypt.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | Adds this resource to the terraform JSON output. | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | getAnyMapAttribute | *No description.* | @@ -123,6 +124,14 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +Adds this resource to the terraform JSON output. + ##### `toMetadata` ```typescript diff --git a/docs/databaseSecretBackendConnection.csharp.md b/docs/databaseSecretBackendConnection.csharp.md index 4a38cf9c..b8b0de87 100644 --- a/docs/databaseSecretBackendConnection.csharp.md +++ b/docs/databaseSecretBackendConnection.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -168,6 +169,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/databaseSecretBackendConnection.go.md b/docs/databaseSecretBackendConnection.go.md index 9740b5e9..becb57ce 100644 --- a/docs/databaseSecretBackendConnection.go.md +++ b/docs/databaseSecretBackendConnection.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnection(scope Construct, id *string, config DatabaseSecretBackendConnectionConfig) DatabaseSecretBackendConnection ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -168,6 +169,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -780,7 +787,7 @@ func ResetVerifyConnection() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" databasesecretbackendconnection.DatabaseSecretBackendConnection_IsConstruct(x interface{}) *bool ``` @@ -812,7 +819,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" databasesecretbackendconnection.DatabaseSecretBackendConnection_IsTerraformElement(x interface{}) *bool ``` @@ -826,7 +833,7 @@ databasesecretbackendconnection.DatabaseSecretBackendConnection_IsTerraformEleme ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" databasesecretbackendconnection.DatabaseSecretBackendConnection_IsTerraformResource(x interface{}) *bool ``` @@ -840,7 +847,7 @@ databasesecretbackendconnection.DatabaseSecretBackendConnection_IsTerraformResou ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" databasesecretbackendconnection.DatabaseSecretBackendConnection_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1663,7 +1670,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionCassandra { ConnectTimeout: *f64, @@ -1845,7 +1852,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionConfig { Connection: interface{}, @@ -1858,29 +1865,29 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackend Backend: *string, Name: *string, AllowedRoles: *[]*string, - Cassandra: github.com/cdktf/cdktf-provider-vault-go/vault/v11.databaseSecretBackendConnection.DatabaseSecretBackendConnectionCassandra, - Couchbase: github.com/cdktf/cdktf-provider-vault-go/vault/v11.databaseSecretBackendConnection.DatabaseSecretBackendConnectionCouchbase, + Cassandra: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionCassandra, + Couchbase: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionCouchbase, Data: *map[string]*string, - Elasticsearch: github.com/cdktf/cdktf-provider-vault-go/vault/v11.databaseSecretBackendConnection.DatabaseSecretBackendConnectionElasticsearch, - Hana: github.com/cdktf/cdktf-provider-vault-go/vault/v11.databaseSecretBackendConnection.DatabaseSecretBackendConnectionHana, + Elasticsearch: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionElasticsearch, + Hana: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionHana, Id: *string, - Influxdb: github.com/cdktf/cdktf-provider-vault-go/vault/v11.databaseSecretBackendConnection.DatabaseSecretBackendConnectionInfluxdb, - Mongodb: github.com/cdktf/cdktf-provider-vault-go/vault/v11.databaseSecretBackendConnection.DatabaseSecretBackendConnectionMongodb, - Mongodbatlas: github.com/cdktf/cdktf-provider-vault-go/vault/v11.databaseSecretBackendConnection.DatabaseSecretBackendConnectionMongodbatlas, - Mssql: github.com/cdktf/cdktf-provider-vault-go/vault/v11.databaseSecretBackendConnection.DatabaseSecretBackendConnectionMssql, - Mysql: github.com/cdktf/cdktf-provider-vault-go/vault/v11.databaseSecretBackendConnection.DatabaseSecretBackendConnectionMysql, - MysqlAurora: github.com/cdktf/cdktf-provider-vault-go/vault/v11.databaseSecretBackendConnection.DatabaseSecretBackendConnectionMysqlAurora, - MysqlLegacy: github.com/cdktf/cdktf-provider-vault-go/vault/v11.databaseSecretBackendConnection.DatabaseSecretBackendConnectionMysqlLegacy, - MysqlRds: github.com/cdktf/cdktf-provider-vault-go/vault/v11.databaseSecretBackendConnection.DatabaseSecretBackendConnectionMysqlRds, + Influxdb: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionInfluxdb, + Mongodb: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionMongodb, + Mongodbatlas: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionMongodbatlas, + Mssql: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionMssql, + Mysql: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionMysql, + MysqlAurora: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionMysqlAurora, + MysqlLegacy: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionMysqlLegacy, + MysqlRds: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionMysqlRds, Namespace: *string, - Oracle: github.com/cdktf/cdktf-provider-vault-go/vault/v11.databaseSecretBackendConnection.DatabaseSecretBackendConnectionOracle, + Oracle: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionOracle, PluginName: *string, - Postgresql: github.com/cdktf/cdktf-provider-vault-go/vault/v11.databaseSecretBackendConnection.DatabaseSecretBackendConnectionPostgresql, - Redis: github.com/cdktf/cdktf-provider-vault-go/vault/v11.databaseSecretBackendConnection.DatabaseSecretBackendConnectionRedis, - RedisElasticache: github.com/cdktf/cdktf-provider-vault-go/vault/v11.databaseSecretBackendConnection.DatabaseSecretBackendConnectionRedisElasticache, - Redshift: github.com/cdktf/cdktf-provider-vault-go/vault/v11.databaseSecretBackendConnection.DatabaseSecretBackendConnectionRedshift, + Postgresql: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionPostgresql, + Redis: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionRedis, + RedisElasticache: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionRedisElasticache, + Redshift: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionRedshift, RootRotationStatements: *[]*string, - Snowflake: github.com/cdktf/cdktf-provider-vault-go/vault/v11.databaseSecretBackendConnection.DatabaseSecretBackendConnectionSnowflake, + Snowflake: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionSnowflake, VerifyConnection: interface{}, } ``` @@ -2382,7 +2389,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionCouchbase { Hosts: *[]*string, @@ -2530,7 +2537,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionElasticsearch { Password: *string, @@ -2708,7 +2715,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionHana { ConnectionUrl: *string, @@ -2838,7 +2845,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionInfluxdb { Host: *string, @@ -3020,7 +3027,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionMongodb { ConnectionUrl: *string, @@ -3150,7 +3157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionMongodbatlas { PrivateKey: *string, @@ -3216,7 +3223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionMssql { ConnectionUrl: *string, @@ -3378,7 +3385,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionMysql { AuthType: *string, @@ -3574,7 +3581,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionMysqlAurora { ConnectionUrl: *string, @@ -3704,7 +3711,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionMysqlLegacy { ConnectionUrl: *string, @@ -3834,7 +3841,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionMysqlRds { ConnectionUrl: *string, @@ -3964,7 +3971,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionOracle { ConnectionUrl: *string, @@ -4094,7 +4101,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionPostgresql { AuthType: *string, @@ -4272,7 +4279,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionRedis { Host: *string, @@ -4402,7 +4409,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionRedisElasticache { Url: *string, @@ -4490,7 +4497,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionRedshift { ConnectionUrl: *string, @@ -4636,7 +4643,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionSnowflake { ConnectionUrl: *string, @@ -4768,7 +4775,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionCassandraOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionCassandraOutputReference ``` @@ -5307,7 +5314,7 @@ func InternalValue() DatabaseSecretBackendConnectionCassandra #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionCouchbaseOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionCouchbaseOutputReference ``` @@ -5767,7 +5774,7 @@ func InternalValue() DatabaseSecretBackendConnectionCouchbase #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionElasticsearchOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionElasticsearchOutputReference ``` @@ -6285,7 +6292,7 @@ func InternalValue() DatabaseSecretBackendConnectionElasticsearch #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionHanaOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionHanaOutputReference ``` @@ -6737,7 +6744,7 @@ func InternalValue() DatabaseSecretBackendConnectionHana #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionInfluxdbOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionInfluxdbOutputReference ``` @@ -7255,7 +7262,7 @@ func InternalValue() DatabaseSecretBackendConnectionInfluxdb #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionMongodbatlasOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionMongodbatlasOutputReference ``` @@ -7570,7 +7577,7 @@ func InternalValue() DatabaseSecretBackendConnectionMongodbatlas #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionMongodbOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionMongodbOutputReference ``` @@ -8022,7 +8029,7 @@ func InternalValue() DatabaseSecretBackendConnectionMongodb #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionMssqlOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionMssqlOutputReference ``` @@ -8532,7 +8539,7 @@ func InternalValue() DatabaseSecretBackendConnectionMssql #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionMysqlAuroraOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionMysqlAuroraOutputReference ``` @@ -8984,7 +8991,7 @@ func InternalValue() DatabaseSecretBackendConnectionMysqlAurora #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionMysqlLegacyOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionMysqlLegacyOutputReference ``` @@ -9436,7 +9443,7 @@ func InternalValue() DatabaseSecretBackendConnectionMysqlLegacy #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionMysqlOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionMysqlOutputReference ``` @@ -10004,7 +10011,7 @@ func InternalValue() DatabaseSecretBackendConnectionMysql #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionMysqlRdsOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionMysqlRdsOutputReference ``` @@ -10456,7 +10463,7 @@ func InternalValue() DatabaseSecretBackendConnectionMysqlRds #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionOracleOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionOracleOutputReference ``` @@ -10908,7 +10915,7 @@ func InternalValue() DatabaseSecretBackendConnectionOracle #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionPostgresqlOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionPostgresqlOutputReference ``` @@ -11447,7 +11454,7 @@ func InternalValue() DatabaseSecretBackendConnectionPostgresql #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionRedisElasticacheOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionRedisElasticacheOutputReference ``` @@ -11805,7 +11812,7 @@ func InternalValue() DatabaseSecretBackendConnectionRedisElasticache #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionRedisOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionRedisOutputReference ``` @@ -12236,7 +12243,7 @@ func InternalValue() DatabaseSecretBackendConnectionRedis #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionRedshiftOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionRedshiftOutputReference ``` @@ -12717,7 +12724,7 @@ func InternalValue() DatabaseSecretBackendConnectionRedshift #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionSnowflakeOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionSnowflakeOutputReference ``` diff --git a/docs/databaseSecretBackendConnection.java.md b/docs/databaseSecretBackendConnection.java.md index 43f78d56..94179afd 100644 --- a/docs/databaseSecretBackendConnection.java.md +++ b/docs/databaseSecretBackendConnection.java.md @@ -436,6 +436,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -550,6 +551,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/databaseSecretBackendConnection.python.md b/docs/databaseSecretBackendConnection.python.md index a4d8085d..5517c79e 100644 --- a/docs/databaseSecretBackendConnection.python.md +++ b/docs/databaseSecretBackendConnection.python.md @@ -433,6 +433,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -552,6 +553,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/databaseSecretBackendConnection.typescript.md b/docs/databaseSecretBackendConnection.typescript.md index 0776d272..01cfd892 100644 --- a/docs/databaseSecretBackendConnection.typescript.md +++ b/docs/databaseSecretBackendConnection.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -168,6 +169,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/databaseSecretBackendRole.csharp.md b/docs/databaseSecretBackendRole.csharp.md index 07992049..b078844b 100644 --- a/docs/databaseSecretBackendRole.csharp.md +++ b/docs/databaseSecretBackendRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -134,6 +135,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/databaseSecretBackendRole.go.md b/docs/databaseSecretBackendRole.go.md index 3b428dbd..4713a72c 100644 --- a/docs/databaseSecretBackendRole.go.md +++ b/docs/databaseSecretBackendRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendrole" databasesecretbackendrole.NewDatabaseSecretBackendRole(scope Construct, id *string, config DatabaseSecretBackendRoleConfig) DatabaseSecretBackendRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -134,6 +135,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -434,7 +441,7 @@ func ResetRollbackStatements() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendrole" databasesecretbackendrole.DatabaseSecretBackendRole_IsConstruct(x interface{}) *bool ``` @@ -466,7 +473,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendrole" databasesecretbackendrole.DatabaseSecretBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -480,7 +487,7 @@ databasesecretbackendrole.DatabaseSecretBackendRole_IsTerraformElement(x interfa ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendrole" databasesecretbackendrole.DatabaseSecretBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -494,7 +501,7 @@ databasesecretbackendrole.DatabaseSecretBackendRole_IsTerraformResource(x interf ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendrole" databasesecretbackendrole.DatabaseSecretBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1009,7 +1016,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendrole" &databasesecretbackendrole.DatabaseSecretBackendRoleConfig { Connection: interface{}, diff --git a/docs/databaseSecretBackendRole.java.md b/docs/databaseSecretBackendRole.java.md index 41739708..8497ad15 100644 --- a/docs/databaseSecretBackendRole.java.md +++ b/docs/databaseSecretBackendRole.java.md @@ -265,6 +265,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -345,6 +346,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/databaseSecretBackendRole.python.md b/docs/databaseSecretBackendRole.python.md index 6b1b3e22..e718b471 100644 --- a/docs/databaseSecretBackendRole.python.md +++ b/docs/databaseSecretBackendRole.python.md @@ -263,6 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -348,6 +349,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/databaseSecretBackendRole.typescript.md b/docs/databaseSecretBackendRole.typescript.md index 2c653310..14bbbcf3 100644 --- a/docs/databaseSecretBackendRole.typescript.md +++ b/docs/databaseSecretBackendRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -134,6 +135,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/databaseSecretBackendStaticRole.csharp.md b/docs/databaseSecretBackendStaticRole.csharp.md index 1a8b2eff..420cbc80 100644 --- a/docs/databaseSecretBackendStaticRole.csharp.md +++ b/docs/databaseSecretBackendStaticRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/databaseSecretBackendStaticRole.go.md b/docs/databaseSecretBackendStaticRole.go.md index 523faa8d..17aebdba 100644 --- a/docs/databaseSecretBackendStaticRole.go.md +++ b/docs/databaseSecretBackendStaticRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendstaticrole" databasesecretbackendstaticrole.NewDatabaseSecretBackendStaticRole(scope Construct, id *string, config DatabaseSecretBackendStaticRoleConfig) DatabaseSecretBackendStaticRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -413,7 +420,7 @@ func ResetRotationWindow() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendstaticrole" databasesecretbackendstaticrole.DatabaseSecretBackendStaticRole_IsConstruct(x interface{}) *bool ``` @@ -445,7 +452,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendstaticrole" databasesecretbackendstaticrole.DatabaseSecretBackendStaticRole_IsTerraformElement(x interface{}) *bool ``` @@ -459,7 +466,7 @@ databasesecretbackendstaticrole.DatabaseSecretBackendStaticRole_IsTerraformEleme ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendstaticrole" databasesecretbackendstaticrole.DatabaseSecretBackendStaticRole_IsTerraformResource(x interface{}) *bool ``` @@ -473,7 +480,7 @@ databasesecretbackendstaticrole.DatabaseSecretBackendStaticRole_IsTerraformResou ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendstaticrole" databasesecretbackendstaticrole.DatabaseSecretBackendStaticRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -922,7 +929,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendstaticrole" &databasesecretbackendstaticrole.DatabaseSecretBackendStaticRoleConfig { Connection: interface{}, diff --git a/docs/databaseSecretBackendStaticRole.java.md b/docs/databaseSecretBackendStaticRole.java.md index 5d5805a6..10c1a167 100644 --- a/docs/databaseSecretBackendStaticRole.java.md +++ b/docs/databaseSecretBackendStaticRole.java.md @@ -229,6 +229,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -306,6 +307,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/databaseSecretBackendStaticRole.python.md b/docs/databaseSecretBackendStaticRole.python.md index e5277e4d..01426709 100644 --- a/docs/databaseSecretBackendStaticRole.python.md +++ b/docs/databaseSecretBackendStaticRole.python.md @@ -227,6 +227,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -309,6 +310,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/databaseSecretBackendStaticRole.typescript.md b/docs/databaseSecretBackendStaticRole.typescript.md index 1804b752..7dc79d93 100644 --- a/docs/databaseSecretBackendStaticRole.typescript.md +++ b/docs/databaseSecretBackendStaticRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/databaseSecretsMount.csharp.md b/docs/databaseSecretsMount.csharp.md index 21687f04..ed496f11 100644 --- a/docs/databaseSecretsMount.csharp.md +++ b/docs/databaseSecretsMount.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -173,6 +174,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp @@ -6780,6 +6787,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -6787,6 +6795,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp @@ -7647,6 +7671,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -7654,6 +7679,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp @@ -8435,6 +8476,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -8442,6 +8484,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp @@ -9281,6 +9339,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -9288,6 +9347,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp @@ -10061,6 +10136,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -10068,6 +10144,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp @@ -10907,6 +10999,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -10914,6 +11007,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp @@ -11550,6 +11659,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -11557,6 +11667,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp @@ -12330,6 +12456,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -12337,6 +12464,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp @@ -13168,6 +13311,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -13175,6 +13319,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp @@ -13948,6 +14108,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -13955,6 +14116,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp @@ -14728,6 +14905,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -14735,6 +14913,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp @@ -15624,6 +15818,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -15631,6 +15826,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp @@ -16404,6 +16615,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -16411,6 +16623,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp @@ -17184,6 +17412,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -17191,6 +17420,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp @@ -18051,6 +18296,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -18058,6 +18304,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp @@ -18737,6 +18999,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -18744,6 +19007,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp @@ -19496,6 +19775,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -19503,6 +19783,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp @@ -20305,6 +20601,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -20312,6 +20609,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp diff --git a/docs/databaseSecretsMount.go.md b/docs/databaseSecretsMount.go.md index bde64c65..5d8d57fa 100644 --- a/docs/databaseSecretsMount.go.md +++ b/docs/databaseSecretsMount.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMount(scope Construct, id *string, config DatabaseSecretsMountConfig) DatabaseSecretsMount ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -173,6 +174,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -815,7 +822,7 @@ func ResetSnowflake() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.DatabaseSecretsMount_IsConstruct(x interface{}) *bool ``` @@ -847,7 +854,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.DatabaseSecretsMount_IsTerraformElement(x interface{}) *bool ``` @@ -861,7 +868,7 @@ databasesecretsmount.DatabaseSecretsMount_IsTerraformElement(x interface{}) *boo ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.DatabaseSecretsMount_IsTerraformResource(x interface{}) *bool ``` @@ -875,7 +882,7 @@ databasesecretsmount.DatabaseSecretsMount_IsTerraformResource(x interface{}) *bo ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.DatabaseSecretsMount_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1808,7 +1815,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountCassandra { Name: *string, @@ -2088,7 +2095,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountConfig { Connection: interface{}, @@ -2687,7 +2694,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountCouchbase { Hosts: *[]*string, @@ -2933,7 +2940,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountElasticsearch { Name: *string, @@ -3209,7 +3216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountHana { Name: *string, @@ -3437,7 +3444,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountInfluxdb { Host: *string, @@ -3717,7 +3724,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountMongodb { Name: *string, @@ -3945,7 +3952,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountMongodbatlas { Name: *string, @@ -4109,7 +4116,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountMssql { Name: *string, @@ -4369,7 +4376,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountMysql { Name: *string, @@ -4663,7 +4670,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountMysqlAurora { Name: *string, @@ -4891,7 +4898,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountMysqlLegacy { Name: *string, @@ -5119,7 +5126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountMysqlRds { Name: *string, @@ -5347,7 +5354,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountOracle { Name: *string, @@ -5575,7 +5582,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountPostgresql { Name: *string, @@ -5851,7 +5858,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountRedis { Host: *string, @@ -6079,7 +6086,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountRedisElasticache { Name: *string, @@ -6265,7 +6272,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountRedshift { Name: *string, @@ -6509,7 +6516,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountSnowflake { Name: *string, @@ -6739,7 +6746,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountCassandraList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountCassandraList ``` @@ -6780,6 +6787,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -6787,6 +6795,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -6882,7 +6906,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountCassandraOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountCassandraOutputReference ``` @@ -7606,7 +7630,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountCouchbaseList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountCouchbaseList ``` @@ -7647,6 +7671,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -7654,6 +7679,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -7749,7 +7790,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountCouchbaseOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountCouchbaseOutputReference ``` @@ -8394,7 +8435,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountElasticsearchList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountElasticsearchList ``` @@ -8435,6 +8476,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -8442,6 +8484,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -8537,7 +8595,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountElasticsearchOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountElasticsearchOutputReference ``` @@ -9240,7 +9298,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountHanaList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountHanaList ``` @@ -9281,6 +9339,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -9288,6 +9347,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -9383,7 +9458,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountHanaOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountHanaOutputReference ``` @@ -10020,7 +10095,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountInfluxdbList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountInfluxdbList ``` @@ -10061,6 +10136,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -10068,6 +10144,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -10163,7 +10255,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountInfluxdbOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountInfluxdbOutputReference ``` @@ -10866,7 +10958,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountMongodbatlasList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountMongodbatlasList ``` @@ -10907,6 +10999,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -10914,6 +11007,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -11009,7 +11118,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountMongodbatlasOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountMongodbatlasOutputReference ``` @@ -11509,7 +11618,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountMongodbList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountMongodbList ``` @@ -11550,6 +11659,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -11557,6 +11667,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -11652,7 +11778,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountMongodbOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountMongodbOutputReference ``` @@ -12289,7 +12415,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountMssqlList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountMssqlList ``` @@ -12330,6 +12456,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -12337,6 +12464,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -12432,7 +12575,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountMssqlOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountMssqlOutputReference ``` @@ -13127,7 +13270,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountMysqlAuroraList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountMysqlAuroraList ``` @@ -13168,6 +13311,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -13175,6 +13319,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -13270,7 +13430,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountMysqlAuroraOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountMysqlAuroraOutputReference ``` @@ -13907,7 +14067,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountMysqlLegacyList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountMysqlLegacyList ``` @@ -13948,6 +14108,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -13955,6 +14116,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -14050,7 +14227,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountMysqlLegacyOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountMysqlLegacyOutputReference ``` @@ -14687,7 +14864,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountMysqlList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountMysqlList ``` @@ -14728,6 +14905,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -14735,6 +14913,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -14830,7 +15024,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountMysqlOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountMysqlOutputReference ``` @@ -15583,7 +15777,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountMysqlRdsList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountMysqlRdsList ``` @@ -15624,6 +15818,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -15631,6 +15826,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -15726,7 +15937,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountMysqlRdsOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountMysqlRdsOutputReference ``` @@ -16363,7 +16574,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountOracleList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountOracleList ``` @@ -16404,6 +16615,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -16411,6 +16623,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -16506,7 +16734,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountOracleOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountOracleOutputReference ``` @@ -17143,7 +17371,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountPostgresqlList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountPostgresqlList ``` @@ -17184,6 +17412,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -17191,6 +17420,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -17286,7 +17531,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountPostgresqlOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountPostgresqlOutputReference ``` @@ -18010,7 +18255,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountRedisElasticacheList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountRedisElasticacheList ``` @@ -18051,6 +18296,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -18058,6 +18304,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -18153,7 +18415,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountRedisElasticacheOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountRedisElasticacheOutputReference ``` @@ -18696,7 +18958,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountRedisList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountRedisList ``` @@ -18737,6 +18999,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -18744,6 +19007,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -18839,7 +19118,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountRedisOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountRedisOutputReference ``` @@ -19455,7 +19734,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountRedshiftList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountRedshiftList ``` @@ -19496,6 +19775,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -19503,6 +19783,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -19598,7 +19894,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountRedshiftOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountRedshiftOutputReference ``` @@ -20264,7 +20560,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountSnowflakeList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountSnowflakeList ``` @@ -20305,6 +20601,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -20312,6 +20609,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -20407,7 +20720,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountSnowflakeOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountSnowflakeOutputReference ``` diff --git a/docs/databaseSecretsMount.java.md b/docs/databaseSecretsMount.java.md index f5c1a579..e7b65504 100644 --- a/docs/databaseSecretsMount.java.md +++ b/docs/databaseSecretsMount.java.md @@ -502,6 +502,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -621,6 +622,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java @@ -7287,6 +7294,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -7294,6 +7302,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java @@ -8154,6 +8178,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -8161,6 +8186,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java @@ -8942,6 +8983,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -8949,6 +8991,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java @@ -9788,6 +9846,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -9795,6 +9854,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java @@ -10568,6 +10643,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -10575,6 +10651,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java @@ -11414,6 +11506,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -11421,6 +11514,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java @@ -12057,6 +12166,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -12064,6 +12174,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java @@ -12837,6 +12963,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -12844,6 +12971,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java @@ -13675,6 +13818,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -13682,6 +13826,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java @@ -14455,6 +14615,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -14462,6 +14623,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java @@ -15235,6 +15412,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -15242,6 +15420,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java @@ -16131,6 +16325,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -16138,6 +16333,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java @@ -16911,6 +17122,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -16918,6 +17130,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java @@ -17691,6 +17919,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -17698,6 +17927,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java @@ -18558,6 +18803,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -18565,6 +18811,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java @@ -19244,6 +19506,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -19251,6 +19514,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java @@ -20003,6 +20282,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -20010,6 +20290,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java @@ -20812,6 +21108,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -20819,6 +21116,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java diff --git a/docs/databaseSecretsMount.python.md b/docs/databaseSecretsMount.python.md index 8cdd70e2..d3e335a0 100644 --- a/docs/databaseSecretsMount.python.md +++ b/docs/databaseSecretsMount.python.md @@ -479,6 +479,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -603,6 +604,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python @@ -7293,6 +7300,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -7300,6 +7308,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python @@ -8195,6 +8221,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -8202,6 +8229,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python @@ -9018,6 +9063,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -9025,6 +9071,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python @@ -9899,6 +9963,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -9906,6 +9971,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python @@ -10714,6 +10797,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -10721,6 +10805,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python @@ -11595,6 +11697,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -11602,6 +11705,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python @@ -12273,6 +12394,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -12280,6 +12402,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python @@ -13088,6 +13228,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -13095,6 +13236,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python @@ -13961,6 +14120,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -13968,6 +14128,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python @@ -14776,6 +14954,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -14783,6 +14962,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python @@ -15591,6 +15788,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -15598,6 +15796,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python @@ -16522,6 +16738,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -16529,6 +16746,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python @@ -17337,6 +17572,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -17344,6 +17580,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python @@ -18152,6 +18406,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -18159,6 +18414,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python @@ -19054,6 +19327,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -19061,6 +19335,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python @@ -19775,6 +20067,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -19782,6 +20075,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python @@ -20569,6 +20880,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -20576,6 +20888,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python @@ -21413,6 +21743,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -21420,6 +21751,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python diff --git a/docs/databaseSecretsMount.typescript.md b/docs/databaseSecretsMount.typescript.md index ba3204c3..9202eca7 100644 --- a/docs/databaseSecretsMount.typescript.md +++ b/docs/databaseSecretsMount.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -173,6 +174,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript @@ -6476,6 +6483,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -6483,6 +6491,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript @@ -7343,6 +7367,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -7350,6 +7375,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript @@ -8131,6 +8172,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -8138,6 +8180,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript @@ -8977,6 +9035,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -8984,6 +9043,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript @@ -9757,6 +9832,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -9764,6 +9840,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript @@ -10603,6 +10695,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -10610,6 +10703,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript @@ -11246,6 +11355,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -11253,6 +11363,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript @@ -12026,6 +12152,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -12033,6 +12160,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript @@ -12864,6 +13007,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -12871,6 +13015,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript @@ -13644,6 +13804,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -13651,6 +13812,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript @@ -14424,6 +14601,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -14431,6 +14609,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript @@ -15320,6 +15514,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -15327,6 +15522,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript @@ -16100,6 +16311,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -16107,6 +16319,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript @@ -16880,6 +17108,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -16887,6 +17116,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript @@ -17747,6 +17992,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -17754,6 +18000,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript @@ -18433,6 +18695,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -18440,6 +18703,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript @@ -19192,6 +19471,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -19199,6 +19479,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript @@ -20001,6 +20297,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -20008,6 +20305,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript diff --git a/docs/egpPolicy.csharp.md b/docs/egpPolicy.csharp.md index cfb8d857..3dcba6fa 100644 --- a/docs/egpPolicy.csharp.md +++ b/docs/egpPolicy.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/egpPolicy.go.md b/docs/egpPolicy.go.md index c5eed9e8..f545f1a2 100644 --- a/docs/egpPolicy.go.md +++ b/docs/egpPolicy.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/egppolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/egppolicy" egppolicy.NewEgpPolicy(scope Construct, id *string, config EgpPolicyConfig) EgpPolicy ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -385,7 +392,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/egppolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/egppolicy" egppolicy.EgpPolicy_IsConstruct(x interface{}) *bool ``` @@ -417,7 +424,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/egppolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/egppolicy" egppolicy.EgpPolicy_IsTerraformElement(x interface{}) *bool ``` @@ -431,7 +438,7 @@ egppolicy.EgpPolicy_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/egppolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/egppolicy" egppolicy.EgpPolicy_IsTerraformResource(x interface{}) *bool ``` @@ -445,7 +452,7 @@ egppolicy.EgpPolicy_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/egppolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/egppolicy" egppolicy.EgpPolicy_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -806,7 +813,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/egppolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/egppolicy" &egppolicy.EgpPolicyConfig { Connection: interface{}, diff --git a/docs/egpPolicy.java.md b/docs/egpPolicy.java.md index 1fbf9b0c..99619c87 100644 --- a/docs/egpPolicy.java.md +++ b/docs/egpPolicy.java.md @@ -181,6 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -254,6 +255,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/egpPolicy.python.md b/docs/egpPolicy.python.md index eb064f81..4f61412d 100644 --- a/docs/egpPolicy.python.md +++ b/docs/egpPolicy.python.md @@ -179,6 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -257,6 +258,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/egpPolicy.typescript.md b/docs/egpPolicy.typescript.md index 966f2d84..2102df68 100644 --- a/docs/egpPolicy.typescript.md +++ b/docs/egpPolicy.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/gcpAuthBackend.csharp.md b/docs/gcpAuthBackend.csharp.md index 32d1e875..1a169167 100644 --- a/docs/gcpAuthBackend.csharp.md +++ b/docs/gcpAuthBackend.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -138,6 +139,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/gcpAuthBackend.go.md b/docs/gcpAuthBackend.go.md index e26732bc..99f6aea1 100644 --- a/docs/gcpAuthBackend.go.md +++ b/docs/gcpAuthBackend.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackend" gcpauthbackend.NewGcpAuthBackend(scope Construct, id *string, config GcpAuthBackendConfig) GcpAuthBackend ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -138,6 +139,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -468,7 +475,7 @@ func ResetProjectId() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackend" gcpauthbackend.GcpAuthBackend_IsConstruct(x interface{}) *bool ``` @@ -500,7 +507,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackend" gcpauthbackend.GcpAuthBackend_IsTerraformElement(x interface{}) *bool ``` @@ -514,7 +521,7 @@ gcpauthbackend.GcpAuthBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackend" gcpauthbackend.GcpAuthBackend_IsTerraformResource(x interface{}) *bool ``` @@ -528,7 +535,7 @@ gcpauthbackend.GcpAuthBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackend" gcpauthbackend.GcpAuthBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1032,7 +1039,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackend" &gcpauthbackend.GcpAuthBackendConfig { Connection: interface{}, @@ -1045,7 +1052,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpauthbackend" ClientEmail: *string, ClientId: *string, Credentials: *string, - CustomEndpoint: github.com/cdktf/cdktf-provider-vault-go/vault/v11.gcpAuthBackend.GcpAuthBackendCustomEndpoint, + CustomEndpoint: github.com/cdktf/cdktf-provider-vault-go/vault/v12.gcpAuthBackend.GcpAuthBackendCustomEndpoint, Description: *string, DisableRemount: interface{}, Id: *string, @@ -1313,7 +1320,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackend" &gcpauthbackend.GcpAuthBackendCustomEndpoint { Api: *string, @@ -1397,7 +1404,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackend" gcpauthbackend.NewGcpAuthBackendCustomEndpointOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) GcpAuthBackendCustomEndpointOutputReference ``` diff --git a/docs/gcpAuthBackend.java.md b/docs/gcpAuthBackend.java.md index 550ac2c0..fe0aafd6 100644 --- a/docs/gcpAuthBackend.java.md +++ b/docs/gcpAuthBackend.java.md @@ -241,6 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -325,6 +326,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/gcpAuthBackend.python.md b/docs/gcpAuthBackend.python.md index 6df55e8b..a7d35940 100644 --- a/docs/gcpAuthBackend.python.md +++ b/docs/gcpAuthBackend.python.md @@ -237,6 +237,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -326,6 +327,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/gcpAuthBackend.typescript.md b/docs/gcpAuthBackend.typescript.md index 9e8f5224..785fd6fe 100644 --- a/docs/gcpAuthBackend.typescript.md +++ b/docs/gcpAuthBackend.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -138,6 +139,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/gcpAuthBackendRole.csharp.md b/docs/gcpAuthBackendRole.csharp.md index 68576763..e2a0d1de 100644 --- a/docs/gcpAuthBackendRole.csharp.md +++ b/docs/gcpAuthBackendRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -146,6 +147,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/gcpAuthBackendRole.go.md b/docs/gcpAuthBackendRole.go.md index 45657c35..61077d0f 100644 --- a/docs/gcpAuthBackendRole.go.md +++ b/docs/gcpAuthBackendRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackendrole" gcpauthbackendrole.NewGcpAuthBackendRole(scope Construct, id *string, config GcpAuthBackendRoleConfig) GcpAuthBackendRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -146,6 +147,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -518,7 +525,7 @@ func ResetTokenType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackendrole" gcpauthbackendrole.GcpAuthBackendRole_IsConstruct(x interface{}) *bool ``` @@ -550,7 +557,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackendrole" gcpauthbackendrole.GcpAuthBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -564,7 +571,7 @@ gcpauthbackendrole.GcpAuthBackendRole_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackendrole" gcpauthbackendrole.GcpAuthBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -578,7 +585,7 @@ gcpauthbackendrole.GcpAuthBackendRole_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackendrole" gcpauthbackendrole.GcpAuthBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1313,7 +1320,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackendrole" &gcpauthbackendrole.GcpAuthBackendRoleConfig { Connection: interface{}, diff --git a/docs/gcpAuthBackendRole.java.md b/docs/gcpAuthBackendRole.java.md index 2d5f6a7f..700ec8b1 100644 --- a/docs/gcpAuthBackendRole.java.md +++ b/docs/gcpAuthBackendRole.java.md @@ -364,6 +364,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -456,6 +457,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/gcpAuthBackendRole.python.md b/docs/gcpAuthBackendRole.python.md index 08473cac..06bfe282 100644 --- a/docs/gcpAuthBackendRole.python.md +++ b/docs/gcpAuthBackendRole.python.md @@ -359,6 +359,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -456,6 +457,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/gcpAuthBackendRole.typescript.md b/docs/gcpAuthBackendRole.typescript.md index ffabfaea..20f776b6 100644 --- a/docs/gcpAuthBackendRole.typescript.md +++ b/docs/gcpAuthBackendRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -146,6 +147,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/gcpSecretBackend.csharp.md b/docs/gcpSecretBackend.csharp.md index 5d489b6e..9412545d 100644 --- a/docs/gcpSecretBackend.csharp.md +++ b/docs/gcpSecretBackend.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -134,6 +135,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/gcpSecretBackend.go.md b/docs/gcpSecretBackend.go.md index d3587033..b49bb7cc 100644 --- a/docs/gcpSecretBackend.go.md +++ b/docs/gcpSecretBackend.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretbackend" gcpsecretbackend.NewGcpSecretBackend(scope Construct, id *string, config GcpSecretBackendConfig) GcpSecretBackend ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -134,6 +135,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -434,7 +441,7 @@ func ResetPath() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretbackend" gcpsecretbackend.GcpSecretBackend_IsConstruct(x interface{}) *bool ``` @@ -466,7 +473,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretbackend" gcpsecretbackend.GcpSecretBackend_IsTerraformElement(x interface{}) *bool ``` @@ -480,7 +487,7 @@ gcpsecretbackend.GcpSecretBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretbackend" gcpsecretbackend.GcpSecretBackend_IsTerraformResource(x interface{}) *bool ``` @@ -494,7 +501,7 @@ gcpsecretbackend.GcpSecretBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretbackend" gcpsecretbackend.GcpSecretBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -921,7 +928,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretbackend" &gcpsecretbackend.GcpSecretBackendConfig { Connection: interface{}, diff --git a/docs/gcpSecretBackend.java.md b/docs/gcpSecretBackend.java.md index c4182f53..e107ffca 100644 --- a/docs/gcpSecretBackend.java.md +++ b/docs/gcpSecretBackend.java.md @@ -219,6 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -299,6 +300,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/gcpSecretBackend.python.md b/docs/gcpSecretBackend.python.md index 9fbc547e..fd70a917 100644 --- a/docs/gcpSecretBackend.python.md +++ b/docs/gcpSecretBackend.python.md @@ -215,6 +215,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -300,6 +301,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/gcpSecretBackend.typescript.md b/docs/gcpSecretBackend.typescript.md index 7a329e36..e7b807c6 100644 --- a/docs/gcpSecretBackend.typescript.md +++ b/docs/gcpSecretBackend.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -134,6 +135,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/gcpSecretImpersonatedAccount.csharp.md b/docs/gcpSecretImpersonatedAccount.csharp.md index 12b7d2c1..eae7c1dc 100644 --- a/docs/gcpSecretImpersonatedAccount.csharp.md +++ b/docs/gcpSecretImpersonatedAccount.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/gcpSecretImpersonatedAccount.go.md b/docs/gcpSecretImpersonatedAccount.go.md index 8fa7ee51..8fa5fc77 100644 --- a/docs/gcpSecretImpersonatedAccount.go.md +++ b/docs/gcpSecretImpersonatedAccount.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretimpersonatedaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretimpersonatedaccount" gcpsecretimpersonatedaccount.NewGcpSecretImpersonatedAccount(scope Construct, id *string, config GcpSecretImpersonatedAccountConfig) GcpSecretImpersonatedAccount ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -392,7 +399,7 @@ func ResetTokenScopes() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretimpersonatedaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretimpersonatedaccount" gcpsecretimpersonatedaccount.GcpSecretImpersonatedAccount_IsConstruct(x interface{}) *bool ``` @@ -424,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretimpersonatedaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretimpersonatedaccount" gcpsecretimpersonatedaccount.GcpSecretImpersonatedAccount_IsTerraformElement(x interface{}) *bool ``` @@ -438,7 +445,7 @@ gcpsecretimpersonatedaccount.GcpSecretImpersonatedAccount_IsTerraformElement(x i ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretimpersonatedaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretimpersonatedaccount" gcpsecretimpersonatedaccount.GcpSecretImpersonatedAccount_IsTerraformResource(x interface{}) *bool ``` @@ -452,7 +459,7 @@ gcpsecretimpersonatedaccount.GcpSecretImpersonatedAccount_IsTerraformResource(x ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretimpersonatedaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretimpersonatedaccount" gcpsecretimpersonatedaccount.GcpSecretImpersonatedAccount_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -824,7 +831,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretimpersonatedaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretimpersonatedaccount" &gcpsecretimpersonatedaccount.GcpSecretImpersonatedAccountConfig { Connection: interface{}, diff --git a/docs/gcpSecretImpersonatedAccount.java.md b/docs/gcpSecretImpersonatedAccount.java.md index a2996373..db57c7e3 100644 --- a/docs/gcpSecretImpersonatedAccount.java.md +++ b/docs/gcpSecretImpersonatedAccount.java.md @@ -181,6 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -255,6 +256,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/gcpSecretImpersonatedAccount.python.md b/docs/gcpSecretImpersonatedAccount.python.md index 436dfa21..7abb6e0c 100644 --- a/docs/gcpSecretImpersonatedAccount.python.md +++ b/docs/gcpSecretImpersonatedAccount.python.md @@ -179,6 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -258,6 +259,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/gcpSecretImpersonatedAccount.typescript.md b/docs/gcpSecretImpersonatedAccount.typescript.md index 2341d24b..a0c6a803 100644 --- a/docs/gcpSecretImpersonatedAccount.typescript.md +++ b/docs/gcpSecretImpersonatedAccount.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/gcpSecretRoleset.csharp.md b/docs/gcpSecretRoleset.csharp.md index ed89aadc..77dd3742 100644 --- a/docs/gcpSecretRoleset.csharp.md +++ b/docs/gcpSecretRoleset.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp @@ -1212,6 +1219,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1219,6 +1227,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp diff --git a/docs/gcpSecretRoleset.go.md b/docs/gcpSecretRoleset.go.md index 75f90caa..5d0ac2d4 100644 --- a/docs/gcpSecretRoleset.go.md +++ b/docs/gcpSecretRoleset.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretroleset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretroleset" gcpsecretroleset.NewGcpSecretRoleset(scope Construct, id *string, config GcpSecretRolesetConfig) GcpSecretRoleset ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -412,7 +419,7 @@ func ResetTokenScopes() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretroleset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretroleset" gcpsecretroleset.GcpSecretRoleset_IsConstruct(x interface{}) *bool ``` @@ -444,7 +451,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretroleset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretroleset" gcpsecretroleset.GcpSecretRoleset_IsTerraformElement(x interface{}) *bool ``` @@ -458,7 +465,7 @@ gcpsecretroleset.GcpSecretRoleset_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretroleset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretroleset" gcpsecretroleset.GcpSecretRoleset_IsTerraformResource(x interface{}) *bool ``` @@ -472,7 +479,7 @@ gcpsecretroleset.GcpSecretRoleset_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretroleset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretroleset" gcpsecretroleset.GcpSecretRoleset_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -888,7 +895,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretroleset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretroleset" &gcpsecretroleset.GcpSecretRolesetBinding { Resource: *string, @@ -938,7 +945,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretroleset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretroleset" &gcpsecretroleset.GcpSecretRolesetConfig { Connection: interface{}, @@ -1171,7 +1178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretroleset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretroleset" gcpsecretroleset.NewGcpSecretRolesetBindingList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) GcpSecretRolesetBindingList ``` @@ -1212,6 +1219,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1219,6 +1227,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -1314,7 +1338,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretroleset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretroleset" gcpsecretroleset.NewGcpSecretRolesetBindingOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) GcpSecretRolesetBindingOutputReference ``` diff --git a/docs/gcpSecretRoleset.java.md b/docs/gcpSecretRoleset.java.md index fb5478d6..3b1536bd 100644 --- a/docs/gcpSecretRoleset.java.md +++ b/docs/gcpSecretRoleset.java.md @@ -206,6 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -282,6 +283,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java @@ -1371,6 +1378,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -1378,6 +1386,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java diff --git a/docs/gcpSecretRoleset.python.md b/docs/gcpSecretRoleset.python.md index d81e234c..6c034b50 100644 --- a/docs/gcpSecretRoleset.python.md +++ b/docs/gcpSecretRoleset.python.md @@ -203,6 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -284,6 +285,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python @@ -1415,6 +1422,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -1422,6 +1430,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python diff --git a/docs/gcpSecretRoleset.typescript.md b/docs/gcpSecretRoleset.typescript.md index cb2265e6..447cc8f9 100644 --- a/docs/gcpSecretRoleset.typescript.md +++ b/docs/gcpSecretRoleset.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript @@ -1193,6 +1200,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -1200,6 +1208,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript diff --git a/docs/gcpSecretStaticAccount.csharp.md b/docs/gcpSecretStaticAccount.csharp.md index ee9d2bd9..3bfe0f66 100644 --- a/docs/gcpSecretStaticAccount.csharp.md +++ b/docs/gcpSecretStaticAccount.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp @@ -1219,6 +1226,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1226,6 +1234,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp diff --git a/docs/gcpSecretStaticAccount.go.md b/docs/gcpSecretStaticAccount.go.md index bdfec305..f09d6870 100644 --- a/docs/gcpSecretStaticAccount.go.md +++ b/docs/gcpSecretStaticAccount.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretstaticaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretstaticaccount" gcpsecretstaticaccount.NewGcpSecretStaticAccount(scope Construct, id *string, config GcpSecretStaticAccountConfig) GcpSecretStaticAccount ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -419,7 +426,7 @@ func ResetTokenScopes() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretstaticaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretstaticaccount" gcpsecretstaticaccount.GcpSecretStaticAccount_IsConstruct(x interface{}) *bool ``` @@ -451,7 +458,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretstaticaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretstaticaccount" gcpsecretstaticaccount.GcpSecretStaticAccount_IsTerraformElement(x interface{}) *bool ``` @@ -465,7 +472,7 @@ gcpsecretstaticaccount.GcpSecretStaticAccount_IsTerraformElement(x interface{}) ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretstaticaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretstaticaccount" gcpsecretstaticaccount.GcpSecretStaticAccount_IsTerraformResource(x interface{}) *bool ``` @@ -479,7 +486,7 @@ gcpsecretstaticaccount.GcpSecretStaticAccount_IsTerraformResource(x interface{}) ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretstaticaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretstaticaccount" gcpsecretstaticaccount.GcpSecretStaticAccount_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -895,7 +902,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretstaticaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretstaticaccount" &gcpsecretstaticaccount.GcpSecretStaticAccountBinding { Resource: *string, @@ -945,7 +952,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretstaticaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretstaticaccount" &gcpsecretstaticaccount.GcpSecretStaticAccountConfig { Connection: interface{}, @@ -1178,7 +1185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretstaticaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretstaticaccount" gcpsecretstaticaccount.NewGcpSecretStaticAccountBindingList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) GcpSecretStaticAccountBindingList ``` @@ -1219,6 +1226,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1226,6 +1234,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -1321,7 +1345,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/gcpsecretstaticaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretstaticaccount" gcpsecretstaticaccount.NewGcpSecretStaticAccountBindingOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) GcpSecretStaticAccountBindingOutputReference ``` diff --git a/docs/gcpSecretStaticAccount.java.md b/docs/gcpSecretStaticAccount.java.md index 0dd9e9e5..e9f13cd2 100644 --- a/docs/gcpSecretStaticAccount.java.md +++ b/docs/gcpSecretStaticAccount.java.md @@ -206,6 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -283,6 +284,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java @@ -1378,6 +1385,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -1385,6 +1393,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java diff --git a/docs/gcpSecretStaticAccount.python.md b/docs/gcpSecretStaticAccount.python.md index fc47773d..20ebc39d 100644 --- a/docs/gcpSecretStaticAccount.python.md +++ b/docs/gcpSecretStaticAccount.python.md @@ -203,6 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -285,6 +286,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python @@ -1422,6 +1429,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -1429,6 +1437,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python diff --git a/docs/gcpSecretStaticAccount.typescript.md b/docs/gcpSecretStaticAccount.typescript.md index e73bdf5b..2bbfefe4 100644 --- a/docs/gcpSecretStaticAccount.typescript.md +++ b/docs/gcpSecretStaticAccount.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript @@ -1200,6 +1207,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -1207,6 +1215,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript diff --git a/docs/genericEndpoint.csharp.md b/docs/genericEndpoint.csharp.md index c499d106..60226223 100644 --- a/docs/genericEndpoint.csharp.md +++ b/docs/genericEndpoint.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/genericEndpoint.go.md b/docs/genericEndpoint.go.md index 167468b2..9a26a0e8 100644 --- a/docs/genericEndpoint.go.md +++ b/docs/genericEndpoint.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/genericendpoint" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/genericendpoint" genericendpoint.NewGenericEndpoint(scope Construct, id *string, config GenericEndpointConfig) GenericEndpoint ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -413,7 +420,7 @@ func ResetWriteFields() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/genericendpoint" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/genericendpoint" genericendpoint.GenericEndpoint_IsConstruct(x interface{}) *bool ``` @@ -445,7 +452,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/genericendpoint" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/genericendpoint" genericendpoint.GenericEndpoint_IsTerraformElement(x interface{}) *bool ``` @@ -459,7 +466,7 @@ genericendpoint.GenericEndpoint_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/genericendpoint" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/genericendpoint" genericendpoint.GenericEndpoint_IsTerraformResource(x interface{}) *bool ``` @@ -473,7 +480,7 @@ genericendpoint.GenericEndpoint_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/genericendpoint" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/genericendpoint" genericendpoint.GenericEndpoint_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -900,7 +907,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/genericendpoint" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/genericendpoint" &genericendpoint.GenericEndpointConfig { Connection: interface{}, diff --git a/docs/genericEndpoint.java.md b/docs/genericEndpoint.java.md index 424bc0e4..0d954d72 100644 --- a/docs/genericEndpoint.java.md +++ b/docs/genericEndpoint.java.md @@ -208,6 +208,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -285,6 +286,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/genericEndpoint.python.md b/docs/genericEndpoint.python.md index 469e21a3..b138e4ae 100644 --- a/docs/genericEndpoint.python.md +++ b/docs/genericEndpoint.python.md @@ -203,6 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -285,6 +286,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/genericEndpoint.typescript.md b/docs/genericEndpoint.typescript.md index 2944cb13..f1ee9777 100644 --- a/docs/genericEndpoint.typescript.md +++ b/docs/genericEndpoint.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/genericSecret.csharp.md b/docs/genericSecret.csharp.md index f24a282d..61699519 100644 --- a/docs/genericSecret.csharp.md +++ b/docs/genericSecret.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/genericSecret.go.md b/docs/genericSecret.go.md index 3d94afbb..ede44f87 100644 --- a/docs/genericSecret.go.md +++ b/docs/genericSecret.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/genericsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/genericsecret" genericsecret.NewGenericSecret(scope Construct, id *string, config GenericSecretConfig) GenericSecret ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -399,7 +406,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/genericsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/genericsecret" genericsecret.GenericSecret_IsConstruct(x interface{}) *bool ``` @@ -431,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/genericsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/genericsecret" genericsecret.GenericSecret_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +452,7 @@ genericsecret.GenericSecret_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/genericsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/genericsecret" genericsecret.GenericSecret_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +466,7 @@ genericsecret.GenericSecret_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/genericsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/genericsecret" genericsecret.GenericSecret_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -831,7 +838,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/genericsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/genericsecret" &genericsecret.GenericSecretConfig { Connection: interface{}, diff --git a/docs/genericSecret.java.md b/docs/genericSecret.java.md index 8b403130..04118d77 100644 --- a/docs/genericSecret.java.md +++ b/docs/genericSecret.java.md @@ -183,6 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -258,6 +259,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/genericSecret.python.md b/docs/genericSecret.python.md index 2be4d6a8..87b3ffc0 100644 --- a/docs/genericSecret.python.md +++ b/docs/genericSecret.python.md @@ -179,6 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -259,6 +260,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/genericSecret.typescript.md b/docs/genericSecret.typescript.md index 7b95c63e..69ba71b5 100644 --- a/docs/genericSecret.typescript.md +++ b/docs/genericSecret.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/githubAuthBackend.csharp.md b/docs/githubAuthBackend.csharp.md index a30318e5..fd40f615 100644 --- a/docs/githubAuthBackend.csharp.md +++ b/docs/githubAuthBackend.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -143,6 +144,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp @@ -1763,6 +1770,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1770,6 +1778,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp diff --git a/docs/githubAuthBackend.go.md b/docs/githubAuthBackend.go.md index 0261ce82..4184d43f 100644 --- a/docs/githubAuthBackend.go.md +++ b/docs/githubAuthBackend.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/githubauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubauthbackend" githubauthbackend.NewGithubAuthBackend(scope Construct, id *string, config GithubAuthBackendConfig) GithubAuthBackend ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -143,6 +144,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -503,7 +510,7 @@ func ResetTune() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/githubauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubauthbackend" githubauthbackend.GithubAuthBackend_IsConstruct(x interface{}) *bool ``` @@ -535,7 +542,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/githubauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubauthbackend" githubauthbackend.GithubAuthBackend_IsTerraformElement(x interface{}) *bool ``` @@ -549,7 +556,7 @@ githubauthbackend.GithubAuthBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/githubauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubauthbackend" githubauthbackend.GithubAuthBackend_IsTerraformResource(x interface{}) *bool ``` @@ -563,7 +570,7 @@ githubauthbackend.GithubAuthBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/githubauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubauthbackend" githubauthbackend.GithubAuthBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1199,7 +1206,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/githubauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubauthbackend" &githubauthbackend.GithubAuthBackendConfig { Connection: interface{}, @@ -1590,7 +1597,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/githubauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubauthbackend" &githubauthbackend.GithubAuthBackendTune { AllowedResponseHeaders: *[]*string, @@ -1722,7 +1729,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/githubauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubauthbackend" githubauthbackend.NewGithubAuthBackendTuneList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) GithubAuthBackendTuneList ``` @@ -1763,6 +1770,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1770,6 +1778,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -1865,7 +1889,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/githubauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubauthbackend" githubauthbackend.NewGithubAuthBackendTuneOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) GithubAuthBackendTuneOutputReference ``` diff --git a/docs/githubAuthBackend.java.md b/docs/githubAuthBackend.java.md index 487df3de..0b7c68b7 100644 --- a/docs/githubAuthBackend.java.md +++ b/docs/githubAuthBackend.java.md @@ -328,6 +328,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -417,6 +418,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java @@ -2046,6 +2053,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -2053,6 +2061,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java diff --git a/docs/githubAuthBackend.python.md b/docs/githubAuthBackend.python.md index 828e40d9..050f625c 100644 --- a/docs/githubAuthBackend.python.md +++ b/docs/githubAuthBackend.python.md @@ -323,6 +323,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -417,6 +418,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python @@ -2086,6 +2093,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -2093,6 +2101,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python diff --git a/docs/githubAuthBackend.typescript.md b/docs/githubAuthBackend.typescript.md index 3cc7f146..ae72c059 100644 --- a/docs/githubAuthBackend.typescript.md +++ b/docs/githubAuthBackend.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -143,6 +144,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript @@ -1728,6 +1735,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -1735,6 +1743,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript diff --git a/docs/githubTeam.csharp.md b/docs/githubTeam.csharp.md index 9522765f..526b8d79 100644 --- a/docs/githubTeam.csharp.md +++ b/docs/githubTeam.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/githubTeam.go.md b/docs/githubTeam.go.md index c871f491..862ced86 100644 --- a/docs/githubTeam.go.md +++ b/docs/githubTeam.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/githubteam" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubteam" githubteam.NewGithubTeam(scope Construct, id *string, config GithubTeamConfig) GithubTeam ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -399,7 +406,7 @@ func ResetPolicies() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/githubteam" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubteam" githubteam.GithubTeam_IsConstruct(x interface{}) *bool ``` @@ -431,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/githubteam" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubteam" githubteam.GithubTeam_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +452,7 @@ githubteam.GithubTeam_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/githubteam" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubteam" githubteam.GithubTeam_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +466,7 @@ githubteam.GithubTeam_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/githubteam" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubteam" githubteam.GithubTeam_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -798,7 +805,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/githubteam" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubteam" &githubteam.GithubTeamConfig { Connection: interface{}, diff --git a/docs/githubTeam.java.md b/docs/githubTeam.java.md index c39840bb..12d8d9b0 100644 --- a/docs/githubTeam.java.md +++ b/docs/githubTeam.java.md @@ -169,6 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -244,6 +245,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/githubTeam.python.md b/docs/githubTeam.python.md index b8120dd0..af1c948a 100644 --- a/docs/githubTeam.python.md +++ b/docs/githubTeam.python.md @@ -167,6 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -247,6 +248,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/githubTeam.typescript.md b/docs/githubTeam.typescript.md index 1aa854a8..d3c887b2 100644 --- a/docs/githubTeam.typescript.md +++ b/docs/githubTeam.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/githubUser.csharp.md b/docs/githubUser.csharp.md index 2cbc9184..54324a49 100644 --- a/docs/githubUser.csharp.md +++ b/docs/githubUser.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/githubUser.go.md b/docs/githubUser.go.md index bd482415..03d99f62 100644 --- a/docs/githubUser.go.md +++ b/docs/githubUser.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/githubuser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubuser" githubuser.NewGithubUser(scope Construct, id *string, config GithubUserConfig) GithubUser ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -399,7 +406,7 @@ func ResetPolicies() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/githubuser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubuser" githubuser.GithubUser_IsConstruct(x interface{}) *bool ``` @@ -431,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/githubuser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubuser" githubuser.GithubUser_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +452,7 @@ githubuser.GithubUser_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/githubuser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubuser" githubuser.GithubUser_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +466,7 @@ githubuser.GithubUser_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/githubuser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubuser" githubuser.GithubUser_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -798,7 +805,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/githubuser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubuser" &githubuser.GithubUserConfig { Connection: interface{}, diff --git a/docs/githubUser.java.md b/docs/githubUser.java.md index d23a7cc7..dd403e37 100644 --- a/docs/githubUser.java.md +++ b/docs/githubUser.java.md @@ -169,6 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -244,6 +245,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/githubUser.python.md b/docs/githubUser.python.md index adb69e1f..6f25f24e 100644 --- a/docs/githubUser.python.md +++ b/docs/githubUser.python.md @@ -167,6 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -247,6 +248,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/githubUser.typescript.md b/docs/githubUser.typescript.md index 0c021f12..ef60bc7a 100644 --- a/docs/githubUser.typescript.md +++ b/docs/githubUser.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/identityEntity.csharp.md b/docs/identityEntity.csharp.md index a2463510..4d52502a 100644 --- a/docs/identityEntity.csharp.md +++ b/docs/identityEntity.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -132,6 +133,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/identityEntity.go.md b/docs/identityEntity.go.md index a5e16b9c..572b0d05 100644 --- a/docs/identityEntity.go.md +++ b/docs/identityEntity.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentity" identityentity.NewIdentityEntity(scope Construct, id *string, config IdentityEntityConfig) IdentityEntity ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -132,6 +133,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -420,7 +427,7 @@ func ResetPolicies() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentity" identityentity.IdentityEntity_IsConstruct(x interface{}) *bool ``` @@ -452,7 +459,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentity" identityentity.IdentityEntity_IsTerraformElement(x interface{}) *bool ``` @@ -466,7 +473,7 @@ identityentity.IdentityEntity_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentity" identityentity.IdentityEntity_IsTerraformResource(x interface{}) *bool ``` @@ -480,7 +487,7 @@ identityentity.IdentityEntity_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentity" identityentity.IdentityEntity_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -863,7 +870,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentity" &identityentity.IdentityEntityConfig { Connection: interface{}, diff --git a/docs/identityEntity.java.md b/docs/identityEntity.java.md index ffae9517..b9ddb372 100644 --- a/docs/identityEntity.java.md +++ b/docs/identityEntity.java.md @@ -195,6 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -273,6 +274,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/identityEntity.python.md b/docs/identityEntity.python.md index 856d78e1..e40bf5d2 100644 --- a/docs/identityEntity.python.md +++ b/docs/identityEntity.python.md @@ -191,6 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -274,6 +275,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/identityEntity.typescript.md b/docs/identityEntity.typescript.md index 0a1c4836..160e0430 100644 --- a/docs/identityEntity.typescript.md +++ b/docs/identityEntity.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -132,6 +133,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/identityEntityAlias.csharp.md b/docs/identityEntityAlias.csharp.md index 55988c8a..79b9e071 100644 --- a/docs/identityEntityAlias.csharp.md +++ b/docs/identityEntityAlias.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/identityEntityAlias.go.md b/docs/identityEntityAlias.go.md index 27234e0c..188cf923 100644 --- a/docs/identityEntityAlias.go.md +++ b/docs/identityEntityAlias.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityentityalias" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentityalias" identityentityalias.NewIdentityEntityAlias(scope Construct, id *string, config IdentityEntityAliasConfig) IdentityEntityAlias ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -392,7 +399,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityentityalias" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentityalias" identityentityalias.IdentityEntityAlias_IsConstruct(x interface{}) *bool ``` @@ -424,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityentityalias" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentityalias" identityentityalias.IdentityEntityAlias_IsTerraformElement(x interface{}) *bool ``` @@ -438,7 +445,7 @@ identityentityalias.IdentityEntityAlias_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityentityalias" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentityalias" identityentityalias.IdentityEntityAlias_IsTerraformResource(x interface{}) *bool ``` @@ -452,7 +459,7 @@ identityentityalias.IdentityEntityAlias_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityentityalias" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentityalias" identityentityalias.IdentityEntityAlias_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -813,7 +820,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityentityalias" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentityalias" &identityentityalias.IdentityEntityAliasConfig { Connection: interface{}, diff --git a/docs/identityEntityAlias.java.md b/docs/identityEntityAlias.java.md index b7953df4..7a0d027e 100644 --- a/docs/identityEntityAlias.java.md +++ b/docs/identityEntityAlias.java.md @@ -181,6 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -255,6 +256,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/identityEntityAlias.python.md b/docs/identityEntityAlias.python.md index 1b42d3a1..dcc0dd8f 100644 --- a/docs/identityEntityAlias.python.md +++ b/docs/identityEntityAlias.python.md @@ -179,6 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -258,6 +259,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/identityEntityAlias.typescript.md b/docs/identityEntityAlias.typescript.md index c91e5dd4..4dafa1cb 100644 --- a/docs/identityEntityAlias.typescript.md +++ b/docs/identityEntityAlias.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/identityEntityPolicies.csharp.md b/docs/identityEntityPolicies.csharp.md index cdf0abe0..0ebb36a3 100644 --- a/docs/identityEntityPolicies.csharp.md +++ b/docs/identityEntityPolicies.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/identityEntityPolicies.go.md b/docs/identityEntityPolicies.go.md index dff5d56d..203b524f 100644 --- a/docs/identityEntityPolicies.go.md +++ b/docs/identityEntityPolicies.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityentitypolicies" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentitypolicies" identityentitypolicies.NewIdentityEntityPolicies(scope Construct, id *string, config IdentityEntityPoliciesConfig) IdentityEntityPolicies ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -392,7 +399,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityentitypolicies" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentitypolicies" identityentitypolicies.IdentityEntityPolicies_IsConstruct(x interface{}) *bool ``` @@ -424,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityentitypolicies" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentitypolicies" identityentitypolicies.IdentityEntityPolicies_IsTerraformElement(x interface{}) *bool ``` @@ -438,7 +445,7 @@ identityentitypolicies.IdentityEntityPolicies_IsTerraformElement(x interface{}) ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityentitypolicies" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentitypolicies" identityentitypolicies.IdentityEntityPolicies_IsTerraformResource(x interface{}) *bool ``` @@ -452,7 +459,7 @@ identityentitypolicies.IdentityEntityPolicies_IsTerraformResource(x interface{}) ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityentitypolicies" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentitypolicies" identityentitypolicies.IdentityEntityPolicies_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -802,7 +809,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityentitypolicies" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentitypolicies" &identityentitypolicies.IdentityEntityPoliciesConfig { Connection: interface{}, diff --git a/docs/identityEntityPolicies.java.md b/docs/identityEntityPolicies.java.md index 15c085a0..4ebb683f 100644 --- a/docs/identityEntityPolicies.java.md +++ b/docs/identityEntityPolicies.java.md @@ -170,6 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -244,6 +245,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/identityEntityPolicies.python.md b/docs/identityEntityPolicies.python.md index 80f9cad7..fa03b109 100644 --- a/docs/identityEntityPolicies.python.md +++ b/docs/identityEntityPolicies.python.md @@ -167,6 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -246,6 +247,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/identityEntityPolicies.typescript.md b/docs/identityEntityPolicies.typescript.md index f6a55f6e..05a5530d 100644 --- a/docs/identityEntityPolicies.typescript.md +++ b/docs/identityEntityPolicies.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/identityGroup.csharp.md b/docs/identityGroup.csharp.md index 1b3dc7fb..3903c908 100644 --- a/docs/identityGroup.csharp.md +++ b/docs/identityGroup.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -136,6 +137,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/identityGroup.go.md b/docs/identityGroup.go.md index 30350f9d..6596998e 100644 --- a/docs/identityGroup.go.md +++ b/docs/identityGroup.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroup" identitygroup.NewIdentityGroup(scope Construct, id *string, config IdentityGroupConfig) IdentityGroup ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -136,6 +137,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -448,7 +455,7 @@ func ResetType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroup" identitygroup.IdentityGroup_IsConstruct(x interface{}) *bool ``` @@ -480,7 +487,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroup" identitygroup.IdentityGroup_IsTerraformElement(x interface{}) *bool ``` @@ -494,7 +501,7 @@ identitygroup.IdentityGroup_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroup" identitygroup.IdentityGroup_IsTerraformResource(x interface{}) *bool ``` @@ -508,7 +515,7 @@ identitygroup.IdentityGroup_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroup" identitygroup.IdentityGroup_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -979,7 +986,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroup" &identitygroup.IdentityGroupConfig { Connection: interface{}, diff --git a/docs/identityGroup.java.md b/docs/identityGroup.java.md index 225f2b2f..b6e66cb2 100644 --- a/docs/identityGroup.java.md +++ b/docs/identityGroup.java.md @@ -244,6 +244,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -326,6 +327,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/identityGroup.python.md b/docs/identityGroup.python.md index 29e1b9f9..ae5c2f94 100644 --- a/docs/identityGroup.python.md +++ b/docs/identityGroup.python.md @@ -239,6 +239,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -326,6 +327,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/identityGroup.typescript.md b/docs/identityGroup.typescript.md index e4fd7679..5cff7399 100644 --- a/docs/identityGroup.typescript.md +++ b/docs/identityGroup.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -136,6 +137,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/identityGroupAlias.csharp.md b/docs/identityGroupAlias.csharp.md index 206c971c..e3f42ce7 100644 --- a/docs/identityGroupAlias.csharp.md +++ b/docs/identityGroupAlias.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/identityGroupAlias.go.md b/docs/identityGroupAlias.go.md index 02f8a237..88c13b29 100644 --- a/docs/identityGroupAlias.go.md +++ b/docs/identityGroupAlias.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygroupalias" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupalias" identitygroupalias.NewIdentityGroupAlias(scope Construct, id *string, config IdentityGroupAliasConfig) IdentityGroupAlias ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -385,7 +392,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygroupalias" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupalias" identitygroupalias.IdentityGroupAlias_IsConstruct(x interface{}) *bool ``` @@ -417,7 +424,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygroupalias" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupalias" identitygroupalias.IdentityGroupAlias_IsTerraformElement(x interface{}) *bool ``` @@ -431,7 +438,7 @@ identitygroupalias.IdentityGroupAlias_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygroupalias" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupalias" identitygroupalias.IdentityGroupAlias_IsTerraformResource(x interface{}) *bool ``` @@ -445,7 +452,7 @@ identitygroupalias.IdentityGroupAlias_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygroupalias" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupalias" identitygroupalias.IdentityGroupAlias_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -784,7 +791,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygroupalias" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupalias" &identitygroupalias.IdentityGroupAliasConfig { Connection: interface{}, diff --git a/docs/identityGroupAlias.java.md b/docs/identityGroupAlias.java.md index 2d40c246..22c47fda 100644 --- a/docs/identityGroupAlias.java.md +++ b/docs/identityGroupAlias.java.md @@ -169,6 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -242,6 +243,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/identityGroupAlias.python.md b/docs/identityGroupAlias.python.md index 9cce64c4..24a76506 100644 --- a/docs/identityGroupAlias.python.md +++ b/docs/identityGroupAlias.python.md @@ -167,6 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -245,6 +246,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/identityGroupAlias.typescript.md b/docs/identityGroupAlias.typescript.md index 3c314942..1b75e188 100644 --- a/docs/identityGroupAlias.typescript.md +++ b/docs/identityGroupAlias.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/identityGroupMemberEntityIds.csharp.md b/docs/identityGroupMemberEntityIds.csharp.md index 207c06ff..db564d32 100644 --- a/docs/identityGroupMemberEntityIds.csharp.md +++ b/docs/identityGroupMemberEntityIds.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/identityGroupMemberEntityIds.go.md b/docs/identityGroupMemberEntityIds.go.md index d9d553ef..5a716b13 100644 --- a/docs/identityGroupMemberEntityIds.go.md +++ b/docs/identityGroupMemberEntityIds.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygroupmemberentityids" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupmemberentityids" identitygroupmemberentityids.NewIdentityGroupMemberEntityIds(scope Construct, id *string, config IdentityGroupMemberEntityIdsConfig) IdentityGroupMemberEntityIds ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -399,7 +406,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygroupmemberentityids" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupmemberentityids" identitygroupmemberentityids.IdentityGroupMemberEntityIds_IsConstruct(x interface{}) *bool ``` @@ -431,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygroupmemberentityids" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupmemberentityids" identitygroupmemberentityids.IdentityGroupMemberEntityIds_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +452,7 @@ identitygroupmemberentityids.IdentityGroupMemberEntityIds_IsTerraformElement(x i ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygroupmemberentityids" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupmemberentityids" identitygroupmemberentityids.IdentityGroupMemberEntityIds_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +466,7 @@ identitygroupmemberentityids.IdentityGroupMemberEntityIds_IsTerraformResource(x ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygroupmemberentityids" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupmemberentityids" identitygroupmemberentityids.IdentityGroupMemberEntityIds_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -809,7 +816,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygroupmemberentityids" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupmemberentityids" &identitygroupmemberentityids.IdentityGroupMemberEntityIdsConfig { Connection: interface{}, diff --git a/docs/identityGroupMemberEntityIds.java.md b/docs/identityGroupMemberEntityIds.java.md index c85e89cc..d819521a 100644 --- a/docs/identityGroupMemberEntityIds.java.md +++ b/docs/identityGroupMemberEntityIds.java.md @@ -172,6 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -247,6 +248,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/identityGroupMemberEntityIds.python.md b/docs/identityGroupMemberEntityIds.python.md index 131db2ee..ca97101a 100644 --- a/docs/identityGroupMemberEntityIds.python.md +++ b/docs/identityGroupMemberEntityIds.python.md @@ -169,6 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -249,6 +250,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/identityGroupMemberEntityIds.typescript.md b/docs/identityGroupMemberEntityIds.typescript.md index 4b1ca72d..59ddf554 100644 --- a/docs/identityGroupMemberEntityIds.typescript.md +++ b/docs/identityGroupMemberEntityIds.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/identityGroupMemberGroupIds.csharp.md b/docs/identityGroupMemberGroupIds.csharp.md index c20b4a19..b266c2cc 100644 --- a/docs/identityGroupMemberGroupIds.csharp.md +++ b/docs/identityGroupMemberGroupIds.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/identityGroupMemberGroupIds.go.md b/docs/identityGroupMemberGroupIds.go.md index 4b6efe59..f63c84ce 100644 --- a/docs/identityGroupMemberGroupIds.go.md +++ b/docs/identityGroupMemberGroupIds.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygroupmembergroupids" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupmembergroupids" identitygroupmembergroupids.NewIdentityGroupMemberGroupIds(scope Construct, id *string, config IdentityGroupMemberGroupIdsConfig) IdentityGroupMemberGroupIds ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -399,7 +406,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygroupmembergroupids" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupmembergroupids" identitygroupmembergroupids.IdentityGroupMemberGroupIds_IsConstruct(x interface{}) *bool ``` @@ -431,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygroupmembergroupids" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupmembergroupids" identitygroupmembergroupids.IdentityGroupMemberGroupIds_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +452,7 @@ identitygroupmembergroupids.IdentityGroupMemberGroupIds_IsTerraformElement(x int ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygroupmembergroupids" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupmembergroupids" identitygroupmembergroupids.IdentityGroupMemberGroupIds_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +466,7 @@ identitygroupmembergroupids.IdentityGroupMemberGroupIds_IsTerraformResource(x in ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygroupmembergroupids" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupmembergroupids" identitygroupmembergroupids.IdentityGroupMemberGroupIds_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -798,7 +805,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygroupmembergroupids" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupmembergroupids" &identitygroupmembergroupids.IdentityGroupMemberGroupIdsConfig { Connection: interface{}, diff --git a/docs/identityGroupMemberGroupIds.java.md b/docs/identityGroupMemberGroupIds.java.md index 6f41ebe5..bb5e89e1 100644 --- a/docs/identityGroupMemberGroupIds.java.md +++ b/docs/identityGroupMemberGroupIds.java.md @@ -172,6 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -247,6 +248,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/identityGroupMemberGroupIds.python.md b/docs/identityGroupMemberGroupIds.python.md index fd4fba06..492400b7 100644 --- a/docs/identityGroupMemberGroupIds.python.md +++ b/docs/identityGroupMemberGroupIds.python.md @@ -169,6 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -249,6 +250,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/identityGroupMemberGroupIds.typescript.md b/docs/identityGroupMemberGroupIds.typescript.md index 613cce12..894f849b 100644 --- a/docs/identityGroupMemberGroupIds.typescript.md +++ b/docs/identityGroupMemberGroupIds.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/identityGroupPolicies.csharp.md b/docs/identityGroupPolicies.csharp.md index 4fe6a78e..b2a3067b 100644 --- a/docs/identityGroupPolicies.csharp.md +++ b/docs/identityGroupPolicies.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/identityGroupPolicies.go.md b/docs/identityGroupPolicies.go.md index dbe8e6c6..1185b04d 100644 --- a/docs/identityGroupPolicies.go.md +++ b/docs/identityGroupPolicies.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygrouppolicies" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygrouppolicies" identitygrouppolicies.NewIdentityGroupPolicies(scope Construct, id *string, config IdentityGroupPoliciesConfig) IdentityGroupPolicies ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -392,7 +399,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygrouppolicies" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygrouppolicies" identitygrouppolicies.IdentityGroupPolicies_IsConstruct(x interface{}) *bool ``` @@ -424,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygrouppolicies" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygrouppolicies" identitygrouppolicies.IdentityGroupPolicies_IsTerraformElement(x interface{}) *bool ``` @@ -438,7 +445,7 @@ identitygrouppolicies.IdentityGroupPolicies_IsTerraformElement(x interface{}) *b ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygrouppolicies" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygrouppolicies" identitygrouppolicies.IdentityGroupPolicies_IsTerraformResource(x interface{}) *bool ``` @@ -452,7 +459,7 @@ identitygrouppolicies.IdentityGroupPolicies_IsTerraformResource(x interface{}) * ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygrouppolicies" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygrouppolicies" identitygrouppolicies.IdentityGroupPolicies_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -802,7 +809,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitygrouppolicies" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygrouppolicies" &identitygrouppolicies.IdentityGroupPoliciesConfig { Connection: interface{}, diff --git a/docs/identityGroupPolicies.java.md b/docs/identityGroupPolicies.java.md index cbbb09a5..a2498fb6 100644 --- a/docs/identityGroupPolicies.java.md +++ b/docs/identityGroupPolicies.java.md @@ -170,6 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -244,6 +245,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/identityGroupPolicies.python.md b/docs/identityGroupPolicies.python.md index 846650fe..f633e897 100644 --- a/docs/identityGroupPolicies.python.md +++ b/docs/identityGroupPolicies.python.md @@ -167,6 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -246,6 +247,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/identityGroupPolicies.typescript.md b/docs/identityGroupPolicies.typescript.md index 89822af8..d9b7771c 100644 --- a/docs/identityGroupPolicies.typescript.md +++ b/docs/identityGroupPolicies.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/identityMfaDuo.csharp.md b/docs/identityMfaDuo.csharp.md index fc3e11e7..dfb30b62 100644 --- a/docs/identityMfaDuo.csharp.md +++ b/docs/identityMfaDuo.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/identityMfaDuo.go.md b/docs/identityMfaDuo.go.md index af2b7346..af6de3b7 100644 --- a/docs/identityMfaDuo.go.md +++ b/docs/identityMfaDuo.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfaduo" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaduo" identitymfaduo.NewIdentityMfaDuo(scope Construct, id *string, config IdentityMfaDuoConfig) IdentityMfaDuo ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -406,7 +413,7 @@ func ResetUsernameFormat() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfaduo" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaduo" identitymfaduo.IdentityMfaDuo_IsConstruct(x interface{}) *bool ``` @@ -438,7 +445,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfaduo" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaduo" identitymfaduo.IdentityMfaDuo_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +459,7 @@ identitymfaduo.IdentityMfaDuo_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfaduo" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaduo" identitymfaduo.IdentityMfaDuo_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +473,7 @@ identitymfaduo.IdentityMfaDuo_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfaduo" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaduo" identitymfaduo.IdentityMfaDuo_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -948,7 +955,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfaduo" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaduo" &identitymfaduo.IdentityMfaDuoConfig { Connection: interface{}, diff --git a/docs/identityMfaDuo.java.md b/docs/identityMfaDuo.java.md index a94904af..3d4ca336 100644 --- a/docs/identityMfaDuo.java.md +++ b/docs/identityMfaDuo.java.md @@ -206,6 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -282,6 +283,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/identityMfaDuo.python.md b/docs/identityMfaDuo.python.md index 1c8252a5..3b168b47 100644 --- a/docs/identityMfaDuo.python.md +++ b/docs/identityMfaDuo.python.md @@ -203,6 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -284,6 +285,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/identityMfaDuo.typescript.md b/docs/identityMfaDuo.typescript.md index a27eb71c..a7e61ed5 100644 --- a/docs/identityMfaDuo.typescript.md +++ b/docs/identityMfaDuo.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/identityMfaLoginEnforcement.csharp.md b/docs/identityMfaLoginEnforcement.csharp.md index 568bdd65..91d5bd85 100644 --- a/docs/identityMfaLoginEnforcement.csharp.md +++ b/docs/identityMfaLoginEnforcement.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/identityMfaLoginEnforcement.go.md b/docs/identityMfaLoginEnforcement.go.md index 91d2c521..f5b6dfe3 100644 --- a/docs/identityMfaLoginEnforcement.go.md +++ b/docs/identityMfaLoginEnforcement.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfaloginenforcement" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaloginenforcement" identitymfaloginenforcement.NewIdentityMfaLoginEnforcement(scope Construct, id *string, config IdentityMfaLoginEnforcementConfig) IdentityMfaLoginEnforcement ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -413,7 +420,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfaloginenforcement" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaloginenforcement" identitymfaloginenforcement.IdentityMfaLoginEnforcement_IsConstruct(x interface{}) *bool ``` @@ -445,7 +452,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfaloginenforcement" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaloginenforcement" identitymfaloginenforcement.IdentityMfaLoginEnforcement_IsTerraformElement(x interface{}) *bool ``` @@ -459,7 +466,7 @@ identitymfaloginenforcement.IdentityMfaLoginEnforcement_IsTerraformElement(x int ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfaloginenforcement" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaloginenforcement" identitymfaloginenforcement.IdentityMfaLoginEnforcement_IsTerraformResource(x interface{}) *bool ``` @@ -473,7 +480,7 @@ identitymfaloginenforcement.IdentityMfaLoginEnforcement_IsTerraformResource(x in ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfaloginenforcement" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaloginenforcement" identitymfaloginenforcement.IdentityMfaLoginEnforcement_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -911,7 +918,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfaloginenforcement" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaloginenforcement" &identitymfaloginenforcement.IdentityMfaLoginEnforcementConfig { Connection: interface{}, diff --git a/docs/identityMfaLoginEnforcement.java.md b/docs/identityMfaLoginEnforcement.java.md index 9b0c10f6..e2386671 100644 --- a/docs/identityMfaLoginEnforcement.java.md +++ b/docs/identityMfaLoginEnforcement.java.md @@ -205,6 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -282,6 +283,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/identityMfaLoginEnforcement.python.md b/docs/identityMfaLoginEnforcement.python.md index c14f025e..7bc13adb 100644 --- a/docs/identityMfaLoginEnforcement.python.md +++ b/docs/identityMfaLoginEnforcement.python.md @@ -203,6 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -285,6 +286,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/identityMfaLoginEnforcement.typescript.md b/docs/identityMfaLoginEnforcement.typescript.md index 914b0ef4..631109f3 100644 --- a/docs/identityMfaLoginEnforcement.typescript.md +++ b/docs/identityMfaLoginEnforcement.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/identityMfaOkta.csharp.md b/docs/identityMfaOkta.csharp.md index c5addc66..75e14db3 100644 --- a/docs/identityMfaOkta.csharp.md +++ b/docs/identityMfaOkta.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/identityMfaOkta.go.md b/docs/identityMfaOkta.go.md index 12a57fae..545380eb 100644 --- a/docs/identityMfaOkta.go.md +++ b/docs/identityMfaOkta.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfaokta" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaokta" identitymfaokta.NewIdentityMfaOkta(scope Construct, id *string, config IdentityMfaOktaConfig) IdentityMfaOkta ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -406,7 +413,7 @@ func ResetUsernameFormat() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfaokta" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaokta" identitymfaokta.IdentityMfaOkta_IsConstruct(x interface{}) *bool ``` @@ -438,7 +445,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfaokta" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaokta" identitymfaokta.IdentityMfaOkta_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +459,7 @@ identitymfaokta.IdentityMfaOkta_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfaokta" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaokta" identitymfaokta.IdentityMfaOkta_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +473,7 @@ identitymfaokta.IdentityMfaOkta_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfaokta" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaokta" identitymfaokta.IdentityMfaOkta_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -926,7 +933,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfaokta" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaokta" &identitymfaokta.IdentityMfaOktaConfig { Connection: interface{}, diff --git a/docs/identityMfaOkta.java.md b/docs/identityMfaOkta.java.md index 084b48db..9d6fda12 100644 --- a/docs/identityMfaOkta.java.md +++ b/docs/identityMfaOkta.java.md @@ -194,6 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -270,6 +271,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/identityMfaOkta.python.md b/docs/identityMfaOkta.python.md index 64cd67c8..b72b0169 100644 --- a/docs/identityMfaOkta.python.md +++ b/docs/identityMfaOkta.python.md @@ -191,6 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -272,6 +273,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/identityMfaOkta.typescript.md b/docs/identityMfaOkta.typescript.md index e110eab1..bb8dcdb7 100644 --- a/docs/identityMfaOkta.typescript.md +++ b/docs/identityMfaOkta.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/identityMfaPingid.csharp.md b/docs/identityMfaPingid.csharp.md index 8b03f2fb..2f58098b 100644 --- a/docs/identityMfaPingid.csharp.md +++ b/docs/identityMfaPingid.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/identityMfaPingid.go.md b/docs/identityMfaPingid.go.md index d7c8c2af..d751e317 100644 --- a/docs/identityMfaPingid.go.md +++ b/docs/identityMfaPingid.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfapingid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfapingid" identitymfapingid.NewIdentityMfaPingid(scope Construct, id *string, config IdentityMfaPingidConfig) IdentityMfaPingid ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -392,7 +399,7 @@ func ResetUsernameFormat() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfapingid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfapingid" identitymfapingid.IdentityMfaPingid_IsConstruct(x interface{}) *bool ``` @@ -424,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfapingid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfapingid" identitymfapingid.IdentityMfaPingid_IsTerraformElement(x interface{}) *bool ``` @@ -438,7 +445,7 @@ identitymfapingid.IdentityMfaPingid_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfapingid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfapingid" identitymfapingid.IdentityMfaPingid_IsTerraformResource(x interface{}) *bool ``` @@ -452,7 +459,7 @@ identitymfapingid.IdentityMfaPingid_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfapingid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfapingid" identitymfapingid.IdentityMfaPingid_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -901,7 +908,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfapingid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfapingid" &identitymfapingid.IdentityMfaPingidConfig { Connection: interface{}, diff --git a/docs/identityMfaPingid.java.md b/docs/identityMfaPingid.java.md index 343cde2f..125b8e68 100644 --- a/docs/identityMfaPingid.java.md +++ b/docs/identityMfaPingid.java.md @@ -157,6 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -231,6 +232,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/identityMfaPingid.python.md b/docs/identityMfaPingid.python.md index 175e22aa..d5f45909 100644 --- a/docs/identityMfaPingid.python.md +++ b/docs/identityMfaPingid.python.md @@ -155,6 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -234,6 +235,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/identityMfaPingid.typescript.md b/docs/identityMfaPingid.typescript.md index 97402e72..343550c4 100644 --- a/docs/identityMfaPingid.typescript.md +++ b/docs/identityMfaPingid.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/identityMfaTotp.csharp.md b/docs/identityMfaTotp.csharp.md index 9a453b89..714645dd 100644 --- a/docs/identityMfaTotp.csharp.md +++ b/docs/identityMfaTotp.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -134,6 +135,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/identityMfaTotp.go.md b/docs/identityMfaTotp.go.md index 4f647205..4c8a02b7 100644 --- a/docs/identityMfaTotp.go.md +++ b/docs/identityMfaTotp.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfatotp" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfatotp" identitymfatotp.NewIdentityMfaTotp(scope Construct, id *string, config IdentityMfaTotpConfig) IdentityMfaTotp ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -134,6 +135,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -434,7 +441,7 @@ func ResetSkew() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfatotp" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfatotp" identitymfatotp.IdentityMfaTotp_IsConstruct(x interface{}) *bool ``` @@ -466,7 +473,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfatotp" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfatotp" identitymfatotp.IdentityMfaTotp_IsTerraformElement(x interface{}) *bool ``` @@ -480,7 +487,7 @@ identitymfatotp.IdentityMfaTotp_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfatotp" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfatotp" identitymfatotp.IdentityMfaTotp_IsTerraformResource(x interface{}) *bool ``` @@ -494,7 +501,7 @@ identitymfatotp.IdentityMfaTotp_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfatotp" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfatotp" identitymfatotp.IdentityMfaTotp_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1020,7 +1027,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identitymfatotp" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfatotp" &identitymfatotp.IdentityMfaTotpConfig { Connection: interface{}, diff --git a/docs/identityMfaTotp.java.md b/docs/identityMfaTotp.java.md index 7e4034cb..cae2c4af 100644 --- a/docs/identityMfaTotp.java.md +++ b/docs/identityMfaTotp.java.md @@ -231,6 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -311,6 +312,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/identityMfaTotp.python.md b/docs/identityMfaTotp.python.md index 2428bc2f..6afed4b6 100644 --- a/docs/identityMfaTotp.python.md +++ b/docs/identityMfaTotp.python.md @@ -229,6 +229,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -314,6 +315,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/identityMfaTotp.typescript.md b/docs/identityMfaTotp.typescript.md index a58ad3ee..3ae01134 100644 --- a/docs/identityMfaTotp.typescript.md +++ b/docs/identityMfaTotp.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -134,6 +135,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/identityOidc.csharp.md b/docs/identityOidc.csharp.md index 48c1f06c..e49d2abb 100644 --- a/docs/identityOidc.csharp.md +++ b/docs/identityOidc.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/identityOidc.go.md b/docs/identityOidc.go.md index 24fca241..f6e200f6 100644 --- a/docs/identityOidc.go.md +++ b/docs/identityOidc.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidc" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidc" identityoidc.NewIdentityOidc(scope Construct, id *string, config IdentityOidcConfig) IdentityOidc ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -392,7 +399,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidc" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidc" identityoidc.IdentityOidc_IsConstruct(x interface{}) *bool ``` @@ -424,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidc" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidc" identityoidc.IdentityOidc_IsTerraformElement(x interface{}) *bool ``` @@ -438,7 +445,7 @@ identityoidc.IdentityOidc_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidc" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidc" identityoidc.IdentityOidc_IsTerraformResource(x interface{}) *bool ``` @@ -452,7 +459,7 @@ identityoidc.IdentityOidc_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidc" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidc" identityoidc.IdentityOidc_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -747,7 +754,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidc" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidc" &identityoidc.IdentityOidcConfig { Connection: interface{}, diff --git a/docs/identityOidc.java.md b/docs/identityOidc.java.md index e153efbd..4f89bbcc 100644 --- a/docs/identityOidc.java.md +++ b/docs/identityOidc.java.md @@ -147,6 +147,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -221,6 +222,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/identityOidc.python.md b/docs/identityOidc.python.md index 3e451098..4a490773 100644 --- a/docs/identityOidc.python.md +++ b/docs/identityOidc.python.md @@ -145,6 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -224,6 +225,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/identityOidc.typescript.md b/docs/identityOidc.typescript.md index 56f5c67d..22a6da55 100644 --- a/docs/identityOidc.typescript.md +++ b/docs/identityOidc.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/identityOidcAssignment.csharp.md b/docs/identityOidcAssignment.csharp.md index 5bcd57c5..6c403f32 100644 --- a/docs/identityOidcAssignment.csharp.md +++ b/docs/identityOidcAssignment.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/identityOidcAssignment.go.md b/docs/identityOidcAssignment.go.md index 672e1035..2d8ddd39 100644 --- a/docs/identityOidcAssignment.go.md +++ b/docs/identityOidcAssignment.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcassignment" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcassignment" identityoidcassignment.NewIdentityOidcAssignment(scope Construct, id *string, config IdentityOidcAssignmentConfig) IdentityOidcAssignment ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -399,7 +406,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcassignment" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcassignment" identityoidcassignment.IdentityOidcAssignment_IsConstruct(x interface{}) *bool ``` @@ -431,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcassignment" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcassignment" identityoidcassignment.IdentityOidcAssignment_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +452,7 @@ identityoidcassignment.IdentityOidcAssignment_IsTerraformElement(x interface{}) ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcassignment" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcassignment" identityoidcassignment.IdentityOidcAssignment_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +466,7 @@ identityoidcassignment.IdentityOidcAssignment_IsTerraformResource(x interface{}) ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcassignment" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcassignment" identityoidcassignment.IdentityOidcAssignment_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -798,7 +805,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcassignment" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcassignment" &identityoidcassignment.IdentityOidcAssignmentConfig { Connection: interface{}, diff --git a/docs/identityOidcAssignment.java.md b/docs/identityOidcAssignment.java.md index 938b2ced..c3e52e21 100644 --- a/docs/identityOidcAssignment.java.md +++ b/docs/identityOidcAssignment.java.md @@ -169,6 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -244,6 +245,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/identityOidcAssignment.python.md b/docs/identityOidcAssignment.python.md index 04b280ea..67d94667 100644 --- a/docs/identityOidcAssignment.python.md +++ b/docs/identityOidcAssignment.python.md @@ -167,6 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -247,6 +248,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/identityOidcAssignment.typescript.md b/docs/identityOidcAssignment.typescript.md index ac8c14d8..40fcac3f 100644 --- a/docs/identityOidcAssignment.typescript.md +++ b/docs/identityOidcAssignment.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/identityOidcClient.csharp.md b/docs/identityOidcClient.csharp.md index 93dc65ca..d4776ed0 100644 --- a/docs/identityOidcClient.csharp.md +++ b/docs/identityOidcClient.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -133,6 +134,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/identityOidcClient.go.md b/docs/identityOidcClient.go.md index dc97f6a9..b8f8c4ca 100644 --- a/docs/identityOidcClient.go.md +++ b/docs/identityOidcClient.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcclient" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcclient" identityoidcclient.NewIdentityOidcClient(scope Construct, id *string, config IdentityOidcClientConfig) IdentityOidcClient ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -133,6 +134,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -427,7 +434,7 @@ func ResetRedirectUris() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcclient" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcclient" identityoidcclient.IdentityOidcClient_IsConstruct(x interface{}) *bool ``` @@ -459,7 +466,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcclient" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcclient" identityoidcclient.IdentityOidcClient_IsTerraformElement(x interface{}) *bool ``` @@ -473,7 +480,7 @@ identityoidcclient.IdentityOidcClient_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcclient" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcclient" identityoidcclient.IdentityOidcClient_IsTerraformResource(x interface{}) *bool ``` @@ -487,7 +494,7 @@ identityoidcclient.IdentityOidcClient_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcclient" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcclient" identityoidcclient.IdentityOidcClient_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -936,7 +943,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcclient" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcclient" &identityoidcclient.IdentityOidcClientConfig { Connection: interface{}, diff --git a/docs/identityOidcClient.java.md b/docs/identityOidcClient.java.md index 2da7eac7..db34ab73 100644 --- a/docs/identityOidcClient.java.md +++ b/docs/identityOidcClient.java.md @@ -221,6 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -300,6 +301,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/identityOidcClient.python.md b/docs/identityOidcClient.python.md index a88bfbe5..e793a85a 100644 --- a/docs/identityOidcClient.python.md +++ b/docs/identityOidcClient.python.md @@ -219,6 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -303,6 +304,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/identityOidcClient.typescript.md b/docs/identityOidcClient.typescript.md index dde718cb..0a5a30fb 100644 --- a/docs/identityOidcClient.typescript.md +++ b/docs/identityOidcClient.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -133,6 +134,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/identityOidcKey.csharp.md b/docs/identityOidcKey.csharp.md index c1103bb0..9d5d6916 100644 --- a/docs/identityOidcKey.csharp.md +++ b/docs/identityOidcKey.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/identityOidcKey.go.md b/docs/identityOidcKey.go.md index a92dfba3..de7777c1 100644 --- a/docs/identityOidcKey.go.md +++ b/docs/identityOidcKey.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidckey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidckey" identityoidckey.NewIdentityOidcKey(scope Construct, id *string, config IdentityOidcKeyConfig) IdentityOidcKey ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -413,7 +420,7 @@ func ResetVerificationTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidckey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidckey" identityoidckey.IdentityOidcKey_IsConstruct(x interface{}) *bool ``` @@ -445,7 +452,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidckey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidckey" identityoidckey.IdentityOidcKey_IsTerraformElement(x interface{}) *bool ``` @@ -459,7 +466,7 @@ identityoidckey.IdentityOidcKey_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidckey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidckey" identityoidckey.IdentityOidcKey_IsTerraformResource(x interface{}) *bool ``` @@ -473,7 +480,7 @@ identityoidckey.IdentityOidcKey_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidckey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidckey" identityoidckey.IdentityOidcKey_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -856,7 +863,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidckey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidckey" &identityoidckey.IdentityOidcKeyConfig { Connection: interface{}, diff --git a/docs/identityOidcKey.java.md b/docs/identityOidcKey.java.md index 03ccc12d..2973a20f 100644 --- a/docs/identityOidcKey.java.md +++ b/docs/identityOidcKey.java.md @@ -195,6 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -272,6 +273,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/identityOidcKey.python.md b/docs/identityOidcKey.python.md index bd4c084d..af9b2be0 100644 --- a/docs/identityOidcKey.python.md +++ b/docs/identityOidcKey.python.md @@ -193,6 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -275,6 +276,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/identityOidcKey.typescript.md b/docs/identityOidcKey.typescript.md index 4e7bf511..da0b5c0f 100644 --- a/docs/identityOidcKey.typescript.md +++ b/docs/identityOidcKey.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/identityOidcKeyAllowedClientId.csharp.md b/docs/identityOidcKeyAllowedClientId.csharp.md index 7391ea20..c511d38e 100644 --- a/docs/identityOidcKeyAllowedClientId.csharp.md +++ b/docs/identityOidcKeyAllowedClientId.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/identityOidcKeyAllowedClientId.go.md b/docs/identityOidcKeyAllowedClientId.go.md index 0fa2761a..6a54968d 100644 --- a/docs/identityOidcKeyAllowedClientId.go.md +++ b/docs/identityOidcKeyAllowedClientId.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidckeyallowedclientid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidckeyallowedclientid" identityoidckeyallowedclientid.NewIdentityOidcKeyAllowedClientId(scope Construct, id *string, config IdentityOidcKeyAllowedClientIdConfig) IdentityOidcKeyAllowedClientId ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -385,7 +392,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidckeyallowedclientid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidckeyallowedclientid" identityoidckeyallowedclientid.IdentityOidcKeyAllowedClientId_IsConstruct(x interface{}) *bool ``` @@ -417,7 +424,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidckeyallowedclientid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidckeyallowedclientid" identityoidckeyallowedclientid.IdentityOidcKeyAllowedClientId_IsTerraformElement(x interface{}) *bool ``` @@ -431,7 +438,7 @@ identityoidckeyallowedclientid.IdentityOidcKeyAllowedClientId_IsTerraformElement ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidckeyallowedclientid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidckeyallowedclientid" identityoidckeyallowedclientid.IdentityOidcKeyAllowedClientId_IsTerraformResource(x interface{}) *bool ``` @@ -445,7 +452,7 @@ identityoidckeyallowedclientid.IdentityOidcKeyAllowedClientId_IsTerraformResourc ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidckeyallowedclientid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidckeyallowedclientid" identityoidckeyallowedclientid.IdentityOidcKeyAllowedClientId_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -762,7 +769,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidckeyallowedclientid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidckeyallowedclientid" &identityoidckeyallowedclientid.IdentityOidcKeyAllowedClientIdConfig { Connection: interface{}, diff --git a/docs/identityOidcKeyAllowedClientId.java.md b/docs/identityOidcKeyAllowedClientId.java.md index c5faae8d..d14f1e53 100644 --- a/docs/identityOidcKeyAllowedClientId.java.md +++ b/docs/identityOidcKeyAllowedClientId.java.md @@ -157,6 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -230,6 +231,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/identityOidcKeyAllowedClientId.python.md b/docs/identityOidcKeyAllowedClientId.python.md index 566a9439..184162a2 100644 --- a/docs/identityOidcKeyAllowedClientId.python.md +++ b/docs/identityOidcKeyAllowedClientId.python.md @@ -155,6 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -233,6 +234,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/identityOidcKeyAllowedClientId.typescript.md b/docs/identityOidcKeyAllowedClientId.typescript.md index a1ffd734..90e2593d 100644 --- a/docs/identityOidcKeyAllowedClientId.typescript.md +++ b/docs/identityOidcKeyAllowedClientId.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/identityOidcProvider.csharp.md b/docs/identityOidcProvider.csharp.md index ab28a7f2..391e0709 100644 --- a/docs/identityOidcProvider.csharp.md +++ b/docs/identityOidcProvider.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/identityOidcProvider.go.md b/docs/identityOidcProvider.go.md index 0eb78ef8..dfd43659 100644 --- a/docs/identityOidcProvider.go.md +++ b/docs/identityOidcProvider.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcprovider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcprovider" identityoidcprovider.NewIdentityOidcProvider(scope Construct, id *string, config IdentityOidcProviderConfig) IdentityOidcProvider ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -413,7 +420,7 @@ func ResetScopesSupported() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcprovider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcprovider" identityoidcprovider.IdentityOidcProvider_IsConstruct(x interface{}) *bool ``` @@ -445,7 +452,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcprovider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcprovider" identityoidcprovider.IdentityOidcProvider_IsTerraformElement(x interface{}) *bool ``` @@ -459,7 +466,7 @@ identityoidcprovider.IdentityOidcProvider_IsTerraformElement(x interface{}) *boo ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcprovider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcprovider" identityoidcprovider.IdentityOidcProvider_IsTerraformResource(x interface{}) *bool ``` @@ -473,7 +480,7 @@ identityoidcprovider.IdentityOidcProvider_IsTerraformResource(x interface{}) *bo ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcprovider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcprovider" identityoidcprovider.IdentityOidcProvider_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -867,7 +874,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcprovider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcprovider" &identityoidcprovider.IdentityOidcProviderConfig { Connection: interface{}, diff --git a/docs/identityOidcProvider.java.md b/docs/identityOidcProvider.java.md index abe06100..4b61f18e 100644 --- a/docs/identityOidcProvider.java.md +++ b/docs/identityOidcProvider.java.md @@ -196,6 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -273,6 +274,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/identityOidcProvider.python.md b/docs/identityOidcProvider.python.md index c6b02675..8db444c1 100644 --- a/docs/identityOidcProvider.python.md +++ b/docs/identityOidcProvider.python.md @@ -193,6 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -275,6 +276,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/identityOidcProvider.typescript.md b/docs/identityOidcProvider.typescript.md index 5c387bc6..d1d2bdbf 100644 --- a/docs/identityOidcProvider.typescript.md +++ b/docs/identityOidcProvider.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/identityOidcRole.csharp.md b/docs/identityOidcRole.csharp.md index a2c93224..4619963e 100644 --- a/docs/identityOidcRole.csharp.md +++ b/docs/identityOidcRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/identityOidcRole.go.md b/docs/identityOidcRole.go.md index 43758ca3..2864bf6e 100644 --- a/docs/identityOidcRole.go.md +++ b/docs/identityOidcRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcrole" identityoidcrole.NewIdentityOidcRole(scope Construct, id *string, config IdentityOidcRoleConfig) IdentityOidcRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -406,7 +413,7 @@ func ResetTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcrole" identityoidcrole.IdentityOidcRole_IsConstruct(x interface{}) *bool ``` @@ -438,7 +445,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcrole" identityoidcrole.IdentityOidcRole_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +459,7 @@ identityoidcrole.IdentityOidcRole_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcrole" identityoidcrole.IdentityOidcRole_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +473,7 @@ identityoidcrole.IdentityOidcRole_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcrole" identityoidcrole.IdentityOidcRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -849,7 +856,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcrole" &identityoidcrole.IdentityOidcRoleConfig { Connection: interface{}, diff --git a/docs/identityOidcRole.java.md b/docs/identityOidcRole.java.md index 12ccabfa..e7654482 100644 --- a/docs/identityOidcRole.java.md +++ b/docs/identityOidcRole.java.md @@ -193,6 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -269,6 +270,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/identityOidcRole.python.md b/docs/identityOidcRole.python.md index a1c9f79f..6e42939a 100644 --- a/docs/identityOidcRole.python.md +++ b/docs/identityOidcRole.python.md @@ -191,6 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -272,6 +273,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/identityOidcRole.typescript.md b/docs/identityOidcRole.typescript.md index 8db4251c..ebbe144f 100644 --- a/docs/identityOidcRole.typescript.md +++ b/docs/identityOidcRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/identityOidcScope.csharp.md b/docs/identityOidcScope.csharp.md index bab08af4..4eb99436 100644 --- a/docs/identityOidcScope.csharp.md +++ b/docs/identityOidcScope.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/identityOidcScope.go.md b/docs/identityOidcScope.go.md index fee0322f..fc08e938 100644 --- a/docs/identityOidcScope.go.md +++ b/docs/identityOidcScope.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcscope" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcscope" identityoidcscope.NewIdentityOidcScope(scope Construct, id *string, config IdentityOidcScopeConfig) IdentityOidcScope ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -399,7 +406,7 @@ func ResetTemplate() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcscope" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcscope" identityoidcscope.IdentityOidcScope_IsConstruct(x interface{}) *bool ``` @@ -431,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcscope" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcscope" identityoidcscope.IdentityOidcScope_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +452,7 @@ identityoidcscope.IdentityOidcScope_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcscope" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcscope" identityoidcscope.IdentityOidcScope_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +466,7 @@ identityoidcscope.IdentityOidcScope_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcscope" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcscope" identityoidcscope.IdentityOidcScope_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -798,7 +805,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/identityoidcscope" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcscope" &identityoidcscope.IdentityOidcScopeConfig { Connection: interface{}, diff --git a/docs/identityOidcScope.java.md b/docs/identityOidcScope.java.md index 05376699..ba43b185 100644 --- a/docs/identityOidcScope.java.md +++ b/docs/identityOidcScope.java.md @@ -169,6 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -244,6 +245,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/identityOidcScope.python.md b/docs/identityOidcScope.python.md index 44569eb3..2eb5a509 100644 --- a/docs/identityOidcScope.python.md +++ b/docs/identityOidcScope.python.md @@ -167,6 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -247,6 +248,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/identityOidcScope.typescript.md b/docs/identityOidcScope.typescript.md index cd1ed970..cab205ff 100644 --- a/docs/identityOidcScope.typescript.md +++ b/docs/identityOidcScope.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/jwtAuthBackend.csharp.md b/docs/jwtAuthBackend.csharp.md index 238ca1b3..66ed3172 100644 --- a/docs/jwtAuthBackend.csharp.md +++ b/docs/jwtAuthBackend.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -148,6 +149,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp @@ -1960,6 +1967,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1967,6 +1975,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp diff --git a/docs/jwtAuthBackend.go.md b/docs/jwtAuthBackend.go.md index 47f34945..daa475c9 100644 --- a/docs/jwtAuthBackend.go.md +++ b/docs/jwtAuthBackend.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/jwtauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackend" jwtauthbackend.NewJwtAuthBackend(scope Construct, id *string, config JwtAuthBackendConfig) JwtAuthBackend ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -148,6 +149,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -538,7 +545,7 @@ func ResetType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/jwtauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackend" jwtauthbackend.JwtAuthBackend_IsConstruct(x interface{}) *bool ``` @@ -570,7 +577,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/jwtauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackend" jwtauthbackend.JwtAuthBackend_IsTerraformElement(x interface{}) *bool ``` @@ -584,7 +591,7 @@ jwtauthbackend.JwtAuthBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/jwtauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackend" jwtauthbackend.JwtAuthBackend_IsTerraformResource(x interface{}) *bool ``` @@ -598,7 +605,7 @@ jwtauthbackend.JwtAuthBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/jwtauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackend" jwtauthbackend.JwtAuthBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1322,7 +1329,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/jwtauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackend" &jwtauthbackend.JwtAuthBackendConfig { Connection: interface{}, @@ -1787,7 +1794,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/jwtauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackend" &jwtauthbackend.JwtAuthBackendTune { AllowedResponseHeaders: *[]*string, @@ -1919,7 +1926,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/jwtauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackend" jwtauthbackend.NewJwtAuthBackendTuneList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) JwtAuthBackendTuneList ``` @@ -1960,6 +1967,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1967,6 +1975,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -2062,7 +2086,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/jwtauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackend" jwtauthbackend.NewJwtAuthBackendTuneOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) JwtAuthBackendTuneOutputReference ``` diff --git a/docs/jwtAuthBackend.java.md b/docs/jwtAuthBackend.java.md index aa61bf82..c806e80e 100644 --- a/docs/jwtAuthBackend.java.md +++ b/docs/jwtAuthBackend.java.md @@ -387,6 +387,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -481,6 +482,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java @@ -2303,6 +2310,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -2310,6 +2318,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java diff --git a/docs/jwtAuthBackend.python.md b/docs/jwtAuthBackend.python.md index 465c60bf..59fd5266 100644 --- a/docs/jwtAuthBackend.python.md +++ b/docs/jwtAuthBackend.python.md @@ -381,6 +381,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -480,6 +481,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python @@ -2341,6 +2348,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -2348,6 +2356,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python diff --git a/docs/jwtAuthBackend.typescript.md b/docs/jwtAuthBackend.typescript.md index 54da3713..42973fbf 100644 --- a/docs/jwtAuthBackend.typescript.md +++ b/docs/jwtAuthBackend.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -148,6 +149,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript @@ -1921,6 +1928,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -1928,6 +1936,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript diff --git a/docs/jwtAuthBackendRole.csharp.md b/docs/jwtAuthBackendRole.csharp.md index 15927ef1..5ab66871 100644 --- a/docs/jwtAuthBackendRole.csharp.md +++ b/docs/jwtAuthBackendRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -153,6 +154,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/jwtAuthBackendRole.go.md b/docs/jwtAuthBackendRole.go.md index 78248d8c..f82605e1 100644 --- a/docs/jwtAuthBackendRole.go.md +++ b/docs/jwtAuthBackendRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/jwtauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackendrole" jwtauthbackendrole.NewJwtAuthBackendRole(scope Construct, id *string, config JwtAuthBackendRoleConfig) JwtAuthBackendRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -153,6 +154,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -567,7 +574,7 @@ func ResetVerboseOidcLogging() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/jwtauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackendrole" jwtauthbackendrole.JwtAuthBackendRole_IsConstruct(x interface{}) *bool ``` @@ -599,7 +606,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/jwtauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackendrole" jwtauthbackendrole.JwtAuthBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -613,7 +620,7 @@ jwtauthbackendrole.JwtAuthBackendRole_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/jwtauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackendrole" jwtauthbackendrole.JwtAuthBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -627,7 +634,7 @@ jwtauthbackendrole.JwtAuthBackendRole_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/jwtauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackendrole" jwtauthbackendrole.JwtAuthBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1516,7 +1523,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/jwtauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackendrole" &jwtauthbackendrole.JwtAuthBackendRoleConfig { Connection: interface{}, diff --git a/docs/jwtAuthBackendRole.java.md b/docs/jwtAuthBackendRole.java.md index f4cf58a6..6813f61d 100644 --- a/docs/jwtAuthBackendRole.java.md +++ b/docs/jwtAuthBackendRole.java.md @@ -489,6 +489,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -588,6 +589,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/jwtAuthBackendRole.python.md b/docs/jwtAuthBackendRole.python.md index 5638a6bc..7ac497f4 100644 --- a/docs/jwtAuthBackendRole.python.md +++ b/docs/jwtAuthBackendRole.python.md @@ -483,6 +483,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -587,6 +588,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/jwtAuthBackendRole.typescript.md b/docs/jwtAuthBackendRole.typescript.md index a0ec1459..b3e24299 100644 --- a/docs/jwtAuthBackendRole.typescript.md +++ b/docs/jwtAuthBackendRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -153,6 +154,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/kmipSecretBackend.csharp.md b/docs/kmipSecretBackend.csharp.md index e178be93..da91ead0 100644 --- a/docs/kmipSecretBackend.csharp.md +++ b/docs/kmipSecretBackend.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -138,6 +139,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/kmipSecretBackend.go.md b/docs/kmipSecretBackend.go.md index d9c8d2b1..e98d2f9d 100644 --- a/docs/kmipSecretBackend.go.md +++ b/docs/kmipSecretBackend.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kmipsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretbackend" kmipsecretbackend.NewKmipSecretBackend(scope Construct, id *string, config KmipSecretBackendConfig) KmipSecretBackend ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -138,6 +139,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -462,7 +469,7 @@ func ResetTlsMinVersion() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kmipsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretbackend" kmipsecretbackend.KmipSecretBackend_IsConstruct(x interface{}) *bool ``` @@ -494,7 +501,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kmipsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretbackend" kmipsecretbackend.KmipSecretBackend_IsTerraformElement(x interface{}) *bool ``` @@ -508,7 +515,7 @@ kmipsecretbackend.KmipSecretBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kmipsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretbackend" kmipsecretbackend.KmipSecretBackend_IsTerraformResource(x interface{}) *bool ``` @@ -522,7 +529,7 @@ kmipsecretbackend.KmipSecretBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kmipsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretbackend" kmipsecretbackend.KmipSecretBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1059,7 +1066,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kmipsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretbackend" &kmipsecretbackend.KmipSecretBackendConfig { Connection: interface{}, diff --git a/docs/kmipSecretBackend.java.md b/docs/kmipSecretBackend.java.md index 6a7ae7ed..1c962472 100644 --- a/docs/kmipSecretBackend.java.md +++ b/docs/kmipSecretBackend.java.md @@ -280,6 +280,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -364,6 +365,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/kmipSecretBackend.python.md b/docs/kmipSecretBackend.python.md index 7de2be13..dfdba093 100644 --- a/docs/kmipSecretBackend.python.md +++ b/docs/kmipSecretBackend.python.md @@ -277,6 +277,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -366,6 +367,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/kmipSecretBackend.typescript.md b/docs/kmipSecretBackend.typescript.md index 68e5fb7a..5aa5adf3 100644 --- a/docs/kmipSecretBackend.typescript.md +++ b/docs/kmipSecretBackend.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -138,6 +139,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/kmipSecretRole.csharp.md b/docs/kmipSecretRole.csharp.md index 9a6d4946..b674817c 100644 --- a/docs/kmipSecretRole.csharp.md +++ b/docs/kmipSecretRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -144,6 +145,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/kmipSecretRole.go.md b/docs/kmipSecretRole.go.md index 221d0504..3e715b6e 100644 --- a/docs/kmipSecretRole.go.md +++ b/docs/kmipSecretRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kmipsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretrole" kmipsecretrole.NewKmipSecretRole(scope Construct, id *string, config KmipSecretRoleConfig) KmipSecretRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -144,6 +145,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -504,7 +511,7 @@ func ResetTlsClientTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kmipsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretrole" kmipsecretrole.KmipSecretRole_IsConstruct(x interface{}) *bool ``` @@ -536,7 +543,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kmipsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretrole" kmipsecretrole.KmipSecretRole_IsTerraformElement(x interface{}) *bool ``` @@ -550,7 +557,7 @@ kmipsecretrole.KmipSecretRole_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kmipsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretrole" kmipsecretrole.KmipSecretRole_IsTerraformResource(x interface{}) *bool ``` @@ -564,7 +571,7 @@ kmipsecretrole.KmipSecretRole_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kmipsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretrole" kmipsecretrole.KmipSecretRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1277,7 +1284,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kmipsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretrole" &kmipsecretrole.KmipSecretRoleConfig { Connection: interface{}, diff --git a/docs/kmipSecretRole.java.md b/docs/kmipSecretRole.java.md index 17c4dfc6..3c66311c 100644 --- a/docs/kmipSecretRole.java.md +++ b/docs/kmipSecretRole.java.md @@ -387,6 +387,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -477,6 +478,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/kmipSecretRole.python.md b/docs/kmipSecretRole.python.md index 68e888f1..83321e24 100644 --- a/docs/kmipSecretRole.python.md +++ b/docs/kmipSecretRole.python.md @@ -371,6 +371,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -466,6 +467,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/kmipSecretRole.typescript.md b/docs/kmipSecretRole.typescript.md index 3538fa0f..05bb173a 100644 --- a/docs/kmipSecretRole.typescript.md +++ b/docs/kmipSecretRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -144,6 +145,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/kmipSecretScope.csharp.md b/docs/kmipSecretScope.csharp.md index dcdeaeae..58d3ec51 100644 --- a/docs/kmipSecretScope.csharp.md +++ b/docs/kmipSecretScope.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/kmipSecretScope.go.md b/docs/kmipSecretScope.go.md index d906e8ba..8e36b63b 100644 --- a/docs/kmipSecretScope.go.md +++ b/docs/kmipSecretScope.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kmipsecretscope" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretscope" kmipsecretscope.NewKmipSecretScope(scope Construct, id *string, config KmipSecretScopeConfig) KmipSecretScope ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -392,7 +399,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kmipsecretscope" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretscope" kmipsecretscope.KmipSecretScope_IsConstruct(x interface{}) *bool ``` @@ -424,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kmipsecretscope" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretscope" kmipsecretscope.KmipSecretScope_IsTerraformElement(x interface{}) *bool ``` @@ -438,7 +445,7 @@ kmipsecretscope.KmipSecretScope_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kmipsecretscope" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretscope" kmipsecretscope.KmipSecretScope_IsTerraformResource(x interface{}) *bool ``` @@ -452,7 +459,7 @@ kmipsecretscope.KmipSecretScope_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kmipsecretscope" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretscope" kmipsecretscope.KmipSecretScope_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -791,7 +798,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kmipsecretscope" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretscope" &kmipsecretscope.KmipSecretScopeConfig { Connection: interface{}, diff --git a/docs/kmipSecretScope.java.md b/docs/kmipSecretScope.java.md index 33593e55..8b0cdb27 100644 --- a/docs/kmipSecretScope.java.md +++ b/docs/kmipSecretScope.java.md @@ -170,6 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -244,6 +245,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/kmipSecretScope.python.md b/docs/kmipSecretScope.python.md index a8e3e4a1..133f0a06 100644 --- a/docs/kmipSecretScope.python.md +++ b/docs/kmipSecretScope.python.md @@ -167,6 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -246,6 +247,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/kmipSecretScope.typescript.md b/docs/kmipSecretScope.typescript.md index 8f28950a..f5afd710 100644 --- a/docs/kmipSecretScope.typescript.md +++ b/docs/kmipSecretScope.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/kubernetesAuthBackendConfig.csharp.md b/docs/kubernetesAuthBackendConfig.csharp.md index b22ea376..1df8b21a 100644 --- a/docs/kubernetesAuthBackendConfig.csharp.md +++ b/docs/kubernetesAuthBackendConfig.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -134,6 +135,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/kubernetesAuthBackendConfig.go.md b/docs/kubernetesAuthBackendConfig.go.md index 39f20515..5ed799f4 100644 --- a/docs/kubernetesAuthBackendConfig.go.md +++ b/docs/kubernetesAuthBackendConfig.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kubernetesauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetesauthbackendconfig" kubernetesauthbackendconfig.NewKubernetesAuthBackendConfig(scope Construct, id *string, config KubernetesAuthBackendConfigConfig) KubernetesAuthBackendConfig ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -134,6 +135,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -434,7 +441,7 @@ func ResetTokenReviewerJwt() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kubernetesauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetesauthbackendconfig" kubernetesauthbackendconfig.KubernetesAuthBackendConfig_IsConstruct(x interface{}) *bool ``` @@ -466,7 +473,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kubernetesauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetesauthbackendconfig" kubernetesauthbackendconfig.KubernetesAuthBackendConfig_IsTerraformElement(x interface{}) *bool ``` @@ -480,7 +487,7 @@ kubernetesauthbackendconfig.KubernetesAuthBackendConfig_IsTerraformElement(x int ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kubernetesauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetesauthbackendconfig" kubernetesauthbackendconfig.KubernetesAuthBackendConfig_IsTerraformResource(x interface{}) *bool ``` @@ -494,7 +501,7 @@ kubernetesauthbackendconfig.KubernetesAuthBackendConfig_IsTerraformResource(x in ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kubernetesauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetesauthbackendconfig" kubernetesauthbackendconfig.KubernetesAuthBackendConfig_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -943,7 +950,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kubernetesauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetesauthbackendconfig" &kubernetesauthbackendconfig.KubernetesAuthBackendConfigConfig { Connection: interface{}, diff --git a/docs/kubernetesAuthBackendConfig.java.md b/docs/kubernetesAuthBackendConfig.java.md index 9cd975b5..3342d135 100644 --- a/docs/kubernetesAuthBackendConfig.java.md +++ b/docs/kubernetesAuthBackendConfig.java.md @@ -235,6 +235,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -315,6 +316,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/kubernetesAuthBackendConfig.python.md b/docs/kubernetesAuthBackendConfig.python.md index 189bd6db..707e8d39 100644 --- a/docs/kubernetesAuthBackendConfig.python.md +++ b/docs/kubernetesAuthBackendConfig.python.md @@ -231,6 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -316,6 +317,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/kubernetesAuthBackendConfig.typescript.md b/docs/kubernetesAuthBackendConfig.typescript.md index 3a146d48..a00324b0 100644 --- a/docs/kubernetesAuthBackendConfig.typescript.md +++ b/docs/kubernetesAuthBackendConfig.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -134,6 +135,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/kubernetesAuthBackendRole.csharp.md b/docs/kubernetesAuthBackendRole.csharp.md index 0d4c3db2..9ef546cf 100644 --- a/docs/kubernetesAuthBackendRole.csharp.md +++ b/docs/kubernetesAuthBackendRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -139,6 +140,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/kubernetesAuthBackendRole.go.md b/docs/kubernetesAuthBackendRole.go.md index 41312a05..8ae933b6 100644 --- a/docs/kubernetesAuthBackendRole.go.md +++ b/docs/kubernetesAuthBackendRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kubernetesauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetesauthbackendrole" kubernetesauthbackendrole.NewKubernetesAuthBackendRole(scope Construct, id *string, config KubernetesAuthBackendRoleConfig) KubernetesAuthBackendRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -139,6 +140,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -469,7 +476,7 @@ func ResetTokenType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kubernetesauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetesauthbackendrole" kubernetesauthbackendrole.KubernetesAuthBackendRole_IsConstruct(x interface{}) *bool ``` @@ -501,7 +508,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kubernetesauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetesauthbackendrole" kubernetesauthbackendrole.KubernetesAuthBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -515,7 +522,7 @@ kubernetesauthbackendrole.KubernetesAuthBackendRole_IsTerraformElement(x interfa ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kubernetesauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetesauthbackendrole" kubernetesauthbackendrole.KubernetesAuthBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -529,7 +536,7 @@ kubernetesauthbackendrole.KubernetesAuthBackendRole_IsTerraformResource(x interf ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kubernetesauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetesauthbackendrole" kubernetesauthbackendrole.KubernetesAuthBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1132,7 +1139,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kubernetesauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetesauthbackendrole" &kubernetesauthbackendrole.KubernetesAuthBackendRoleConfig { Connection: interface{}, diff --git a/docs/kubernetesAuthBackendRole.java.md b/docs/kubernetesAuthBackendRole.java.md index d785b95a..9710f881 100644 --- a/docs/kubernetesAuthBackendRole.java.md +++ b/docs/kubernetesAuthBackendRole.java.md @@ -318,6 +318,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -403,6 +404,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/kubernetesAuthBackendRole.python.md b/docs/kubernetesAuthBackendRole.python.md index db77ad64..255296a9 100644 --- a/docs/kubernetesAuthBackendRole.python.md +++ b/docs/kubernetesAuthBackendRole.python.md @@ -315,6 +315,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -405,6 +406,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/kubernetesAuthBackendRole.typescript.md b/docs/kubernetesAuthBackendRole.typescript.md index 8a2de954..e1a0f1f7 100644 --- a/docs/kubernetesAuthBackendRole.typescript.md +++ b/docs/kubernetesAuthBackendRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -139,6 +140,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/kubernetesSecretBackend.csharp.md b/docs/kubernetesSecretBackend.csharp.md index 4007d09f..b8f98f4b 100644 --- a/docs/kubernetesSecretBackend.csharp.md +++ b/docs/kubernetesSecretBackend.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -141,6 +142,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/kubernetesSecretBackend.go.md b/docs/kubernetesSecretBackend.go.md index 7d0e442a..ecbc3066 100644 --- a/docs/kubernetesSecretBackend.go.md +++ b/docs/kubernetesSecretBackend.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kubernetessecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetessecretbackend" kubernetessecretbackend.NewKubernetesSecretBackend(scope Construct, id *string, config KubernetesSecretBackendConfig) KubernetesSecretBackend ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -141,6 +142,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -483,7 +490,7 @@ func ResetServiceAccountJwt() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kubernetessecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetessecretbackend" kubernetessecretbackend.KubernetesSecretBackend_IsConstruct(x interface{}) *bool ``` @@ -515,7 +522,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kubernetessecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetessecretbackend" kubernetessecretbackend.KubernetesSecretBackend_IsTerraformElement(x interface{}) *bool ``` @@ -529,7 +536,7 @@ kubernetessecretbackend.KubernetesSecretBackend_IsTerraformElement(x interface{} ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kubernetessecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetessecretbackend" kubernetessecretbackend.KubernetesSecretBackend_IsTerraformResource(x interface{}) *bool ``` @@ -543,7 +550,7 @@ kubernetessecretbackend.KubernetesSecretBackend_IsTerraformResource(x interface{ ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kubernetessecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetessecretbackend" kubernetessecretbackend.KubernetesSecretBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1157,7 +1164,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kubernetessecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetessecretbackend" &kubernetessecretbackend.KubernetesSecretBackendConfig { Connection: interface{}, diff --git a/docs/kubernetesSecretBackend.java.md b/docs/kubernetesSecretBackend.java.md index 6344d25b..c3e043c5 100644 --- a/docs/kubernetesSecretBackend.java.md +++ b/docs/kubernetesSecretBackend.java.md @@ -321,6 +321,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -408,6 +409,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/kubernetesSecretBackend.python.md b/docs/kubernetesSecretBackend.python.md index a6d3bda2..f2a4ca83 100644 --- a/docs/kubernetesSecretBackend.python.md +++ b/docs/kubernetesSecretBackend.python.md @@ -315,6 +315,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -407,6 +408,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/kubernetesSecretBackend.typescript.md b/docs/kubernetesSecretBackend.typescript.md index 524cf6f6..64d1330e 100644 --- a/docs/kubernetesSecretBackend.typescript.md +++ b/docs/kubernetesSecretBackend.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -141,6 +142,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/kubernetesSecretBackendRole.csharp.md b/docs/kubernetesSecretBackendRole.csharp.md index ced3f53d..2122ed7d 100644 --- a/docs/kubernetesSecretBackendRole.csharp.md +++ b/docs/kubernetesSecretBackendRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -136,6 +137,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/kubernetesSecretBackendRole.go.md b/docs/kubernetesSecretBackendRole.go.md index 823f1261..9e97b13b 100644 --- a/docs/kubernetesSecretBackendRole.go.md +++ b/docs/kubernetesSecretBackendRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kubernetessecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetessecretbackendrole" kubernetessecretbackendrole.NewKubernetesSecretBackendRole(scope Construct, id *string, config KubernetesSecretBackendRoleConfig) KubernetesSecretBackendRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -136,6 +137,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -448,7 +455,7 @@ func ResetTokenMaxTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kubernetessecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetessecretbackendrole" kubernetessecretbackendrole.KubernetesSecretBackendRole_IsConstruct(x interface{}) *bool ``` @@ -480,7 +487,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kubernetessecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetessecretbackendrole" kubernetessecretbackendrole.KubernetesSecretBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -494,7 +501,7 @@ kubernetessecretbackendrole.KubernetesSecretBackendRole_IsTerraformElement(x int ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kubernetessecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetessecretbackendrole" kubernetessecretbackendrole.KubernetesSecretBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -508,7 +515,7 @@ kubernetessecretbackendrole.KubernetesSecretBackendRole_IsTerraformResource(x in ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kubernetessecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetessecretbackendrole" kubernetessecretbackendrole.KubernetesSecretBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1045,7 +1052,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kubernetessecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetessecretbackendrole" &kubernetessecretbackendrole.KubernetesSecretBackendRoleConfig { Connection: interface{}, diff --git a/docs/kubernetesSecretBackendRole.java.md b/docs/kubernetesSecretBackendRole.java.md index fbec52eb..b8ae5b2d 100644 --- a/docs/kubernetesSecretBackendRole.java.md +++ b/docs/kubernetesSecretBackendRole.java.md @@ -285,6 +285,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -367,6 +368,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/kubernetesSecretBackendRole.python.md b/docs/kubernetesSecretBackendRole.python.md index 9390a549..59e26238 100644 --- a/docs/kubernetesSecretBackendRole.python.md +++ b/docs/kubernetesSecretBackendRole.python.md @@ -283,6 +283,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -370,6 +371,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/kubernetesSecretBackendRole.typescript.md b/docs/kubernetesSecretBackendRole.typescript.md index e02af4f8..d7e8a62d 100644 --- a/docs/kubernetesSecretBackendRole.typescript.md +++ b/docs/kubernetesSecretBackendRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -136,6 +137,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/kvSecret.csharp.md b/docs/kvSecret.csharp.md index 242e577b..4d81120e 100644 --- a/docs/kvSecret.csharp.md +++ b/docs/kvSecret.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/kvSecret.go.md b/docs/kvSecret.go.md index 6c0bc587..b463f111 100644 --- a/docs/kvSecret.go.md +++ b/docs/kvSecret.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kvsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecret" kvsecret.NewKvSecret(scope Construct, id *string, config KvSecretConfig) KvSecret ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -385,7 +392,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kvsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecret" kvsecret.KvSecret_IsConstruct(x interface{}) *bool ``` @@ -417,7 +424,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kvsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecret" kvsecret.KvSecret_IsTerraformElement(x interface{}) *bool ``` @@ -431,7 +438,7 @@ kvsecret.KvSecret_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kvsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecret" kvsecret.KvSecret_IsTerraformResource(x interface{}) *bool ``` @@ -445,7 +452,7 @@ kvsecret.KvSecret_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kvsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecret" kvsecret.KvSecret_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -773,7 +780,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kvsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecret" &kvsecret.KvSecretConfig { Connection: interface{}, diff --git a/docs/kvSecret.java.md b/docs/kvSecret.java.md index a68dcdef..49a991ed 100644 --- a/docs/kvSecret.java.md +++ b/docs/kvSecret.java.md @@ -157,6 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -230,6 +231,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/kvSecret.python.md b/docs/kvSecret.python.md index e7c4509e..e12d713c 100644 --- a/docs/kvSecret.python.md +++ b/docs/kvSecret.python.md @@ -155,6 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -233,6 +234,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/kvSecret.typescript.md b/docs/kvSecret.typescript.md index e09fe19d..656ca1cb 100644 --- a/docs/kvSecret.typescript.md +++ b/docs/kvSecret.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/kvSecretBackendV2.csharp.md b/docs/kvSecretBackendV2.csharp.md index 25a0fb5b..f76b1c5a 100644 --- a/docs/kvSecretBackendV2.csharp.md +++ b/docs/kvSecretBackendV2.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/kvSecretBackendV2.go.md b/docs/kvSecretBackendV2.go.md index b6703037..414e9dac 100644 --- a/docs/kvSecretBackendV2.go.md +++ b/docs/kvSecretBackendV2.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kvsecretbackendv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretbackendv2" kvsecretbackendv2.NewKvSecretBackendV2(scope Construct, id *string, config KvSecretBackendV2Config) KvSecretBackendV2 ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -406,7 +413,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kvsecretbackendv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretbackendv2" kvsecretbackendv2.KvSecretBackendV2_IsConstruct(x interface{}) *bool ``` @@ -438,7 +445,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kvsecretbackendv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretbackendv2" kvsecretbackendv2.KvSecretBackendV2_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +459,7 @@ kvsecretbackendv2.KvSecretBackendV2_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kvsecretbackendv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretbackendv2" kvsecretbackendv2.KvSecretBackendV2_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +473,7 @@ kvsecretbackendv2.KvSecretBackendV2_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kvsecretbackendv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretbackendv2" kvsecretbackendv2.KvSecretBackendV2_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -827,7 +834,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kvsecretbackendv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretbackendv2" &kvsecretbackendv2.KvSecretBackendV2Config { Connection: interface{}, diff --git a/docs/kvSecretBackendV2.java.md b/docs/kvSecretBackendV2.java.md index cc3ccfa9..04c821df 100644 --- a/docs/kvSecretBackendV2.java.md +++ b/docs/kvSecretBackendV2.java.md @@ -182,6 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -258,6 +259,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/kvSecretBackendV2.python.md b/docs/kvSecretBackendV2.python.md index 238d39ca..60d6141e 100644 --- a/docs/kvSecretBackendV2.python.md +++ b/docs/kvSecretBackendV2.python.md @@ -179,6 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -260,6 +261,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/kvSecretBackendV2.typescript.md b/docs/kvSecretBackendV2.typescript.md index b48bb1bb..20d4a051 100644 --- a/docs/kvSecretBackendV2.typescript.md +++ b/docs/kvSecretBackendV2.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/kvSecretV2.csharp.md b/docs/kvSecretV2.csharp.md index 7e483ef1..84a27fed 100644 --- a/docs/kvSecretV2.csharp.md +++ b/docs/kvSecretV2.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -133,6 +134,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/kvSecretV2.go.md b/docs/kvSecretV2.go.md index 12ab444e..1596f708 100644 --- a/docs/kvSecretV2.go.md +++ b/docs/kvSecretV2.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kvsecretv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretv2" kvsecretv2.NewKvSecretV2(scope Construct, id *string, config KvSecretV2Config) KvSecretV2 ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -133,6 +134,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -433,7 +440,7 @@ func ResetOptions() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kvsecretv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretv2" kvsecretv2.KvSecretV2_IsConstruct(x interface{}) *bool ``` @@ -465,7 +472,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kvsecretv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretv2" kvsecretv2.KvSecretV2_IsTerraformElement(x interface{}) *bool ``` @@ -479,7 +486,7 @@ kvsecretv2.KvSecretV2_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kvsecretv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretv2" kvsecretv2.KvSecretV2_IsTerraformResource(x interface{}) *bool ``` @@ -493,7 +500,7 @@ kvsecretv2.KvSecretV2_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kvsecretv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretv2" kvsecretv2.KvSecretV2_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -975,7 +982,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kvsecretv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretv2" &kvsecretv2.KvSecretV2Config { Connection: interface{}, @@ -989,7 +996,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kvsecretv2" Mount: *string, Name: *string, Cas: *f64, - CustomMetadata: github.com/cdktf/cdktf-provider-vault-go/vault/v11.kvSecretV2.KvSecretV2CustomMetadata, + CustomMetadata: github.com/cdktf/cdktf-provider-vault-go/vault/v12.kvSecretV2.KvSecretV2CustomMetadata, DeleteAllVersions: interface{}, DisableRead: interface{}, Id: *string, @@ -1242,7 +1249,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kvsecretv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretv2" &kvsecretv2.KvSecretV2CustomMetadata { CasRequired: interface{}, @@ -1326,7 +1333,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/kvsecretv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretv2" kvsecretv2.NewKvSecretV2CustomMetadataOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) KvSecretV2CustomMetadataOutputReference ``` diff --git a/docs/kvSecretV2.java.md b/docs/kvSecretV2.java.md index ef7c70a3..e4a8c9f5 100644 --- a/docs/kvSecretV2.java.md +++ b/docs/kvSecretV2.java.md @@ -235,6 +235,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -314,6 +315,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/kvSecretV2.python.md b/docs/kvSecretV2.python.md index d4ac2a00..5923ad34 100644 --- a/docs/kvSecretV2.python.md +++ b/docs/kvSecretV2.python.md @@ -231,6 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -315,6 +316,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/kvSecretV2.typescript.md b/docs/kvSecretV2.typescript.md index 5bf22be6..90590952 100644 --- a/docs/kvSecretV2.typescript.md +++ b/docs/kvSecretV2.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -133,6 +134,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/ldapAuthBackend.csharp.md b/docs/ldapAuthBackend.csharp.md index 45c3f214..41522972 100644 --- a/docs/ldapAuthBackend.csharp.md +++ b/docs/ldapAuthBackend.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -162,6 +163,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/ldapAuthBackend.go.md b/docs/ldapAuthBackend.go.md index df399252..6af947ee 100644 --- a/docs/ldapAuthBackend.go.md +++ b/docs/ldapAuthBackend.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackend" ldapauthbackend.NewLdapAuthBackend(scope Construct, id *string, config LdapAuthBackendConfig) LdapAuthBackend ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -162,6 +163,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -630,7 +637,7 @@ func ResetUseTokenGroups() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackend" ldapauthbackend.LdapAuthBackend_IsConstruct(x interface{}) *bool ``` @@ -662,7 +669,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackend" ldapauthbackend.LdapAuthBackend_IsTerraformElement(x interface{}) *bool ``` @@ -676,7 +683,7 @@ ldapauthbackend.LdapAuthBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackend" ldapauthbackend.LdapAuthBackend_IsTerraformResource(x interface{}) *bool ``` @@ -690,7 +697,7 @@ ldapauthbackend.LdapAuthBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackend" ldapauthbackend.LdapAuthBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1766,7 +1773,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackend" &ldapauthbackend.LdapAuthBackendConfig { Connection: interface{}, diff --git a/docs/ldapAuthBackend.java.md b/docs/ldapAuthBackend.java.md index 5d72f84b..c3e8f9fe 100644 --- a/docs/ldapAuthBackend.java.md +++ b/docs/ldapAuthBackend.java.md @@ -527,6 +527,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -635,6 +636,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/ldapAuthBackend.python.md b/docs/ldapAuthBackend.python.md index 9672f853..87f90f6e 100644 --- a/docs/ldapAuthBackend.python.md +++ b/docs/ldapAuthBackend.python.md @@ -515,6 +515,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -628,6 +629,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/ldapAuthBackend.typescript.md b/docs/ldapAuthBackend.typescript.md index 39d6d130..90fc8af4 100644 --- a/docs/ldapAuthBackend.typescript.md +++ b/docs/ldapAuthBackend.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -162,6 +163,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/ldapAuthBackendGroup.csharp.md b/docs/ldapAuthBackendGroup.csharp.md index f41fc2d6..828c3c9a 100644 --- a/docs/ldapAuthBackendGroup.csharp.md +++ b/docs/ldapAuthBackendGroup.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/ldapAuthBackendGroup.go.md b/docs/ldapAuthBackendGroup.go.md index c5ad5b3a..0325983c 100644 --- a/docs/ldapAuthBackendGroup.go.md +++ b/docs/ldapAuthBackendGroup.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapauthbackendgroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackendgroup" ldapauthbackendgroup.NewLdapAuthBackendGroup(scope Construct, id *string, config LdapAuthBackendGroupConfig) LdapAuthBackendGroup ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -399,7 +406,7 @@ func ResetPolicies() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapauthbackendgroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackendgroup" ldapauthbackendgroup.LdapAuthBackendGroup_IsConstruct(x interface{}) *bool ``` @@ -431,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapauthbackendgroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackendgroup" ldapauthbackendgroup.LdapAuthBackendGroup_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +452,7 @@ ldapauthbackendgroup.LdapAuthBackendGroup_IsTerraformElement(x interface{}) *boo ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapauthbackendgroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackendgroup" ldapauthbackendgroup.LdapAuthBackendGroup_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +466,7 @@ ldapauthbackendgroup.LdapAuthBackendGroup_IsTerraformResource(x interface{}) *bo ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapauthbackendgroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackendgroup" ldapauthbackendgroup.LdapAuthBackendGroup_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -798,7 +805,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapauthbackendgroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackendgroup" &ldapauthbackendgroup.LdapAuthBackendGroupConfig { Connection: interface{}, diff --git a/docs/ldapAuthBackendGroup.java.md b/docs/ldapAuthBackendGroup.java.md index f32fc137..ae72ad36 100644 --- a/docs/ldapAuthBackendGroup.java.md +++ b/docs/ldapAuthBackendGroup.java.md @@ -163,6 +163,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -238,6 +239,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/ldapAuthBackendGroup.python.md b/docs/ldapAuthBackendGroup.python.md index a12729c5..0eac3d17 100644 --- a/docs/ldapAuthBackendGroup.python.md +++ b/docs/ldapAuthBackendGroup.python.md @@ -161,6 +161,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -241,6 +242,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/ldapAuthBackendGroup.typescript.md b/docs/ldapAuthBackendGroup.typescript.md index 51d02ceb..be93eb04 100644 --- a/docs/ldapAuthBackendGroup.typescript.md +++ b/docs/ldapAuthBackendGroup.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/ldapAuthBackendUser.csharp.md b/docs/ldapAuthBackendUser.csharp.md index 53b109ad..d777a9d5 100644 --- a/docs/ldapAuthBackendUser.csharp.md +++ b/docs/ldapAuthBackendUser.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/ldapAuthBackendUser.go.md b/docs/ldapAuthBackendUser.go.md index 2c80a294..a1a4be66 100644 --- a/docs/ldapAuthBackendUser.go.md +++ b/docs/ldapAuthBackendUser.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapauthbackenduser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackenduser" ldapauthbackenduser.NewLdapAuthBackendUser(scope Construct, id *string, config LdapAuthBackendUserConfig) LdapAuthBackendUser ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -406,7 +413,7 @@ func ResetPolicies() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapauthbackenduser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackenduser" ldapauthbackenduser.LdapAuthBackendUser_IsConstruct(x interface{}) *bool ``` @@ -438,7 +445,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapauthbackenduser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackenduser" ldapauthbackenduser.LdapAuthBackendUser_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +459,7 @@ ldapauthbackenduser.LdapAuthBackendUser_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapauthbackenduser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackenduser" ldapauthbackenduser.LdapAuthBackendUser_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +473,7 @@ ldapauthbackenduser.LdapAuthBackendUser_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapauthbackenduser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackenduser" ldapauthbackenduser.LdapAuthBackendUser_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -827,7 +834,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapauthbackenduser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackenduser" &ldapauthbackenduser.LdapAuthBackendUserConfig { Connection: interface{}, diff --git a/docs/ldapAuthBackendUser.java.md b/docs/ldapAuthBackendUser.java.md index 34855faf..9b9629ee 100644 --- a/docs/ldapAuthBackendUser.java.md +++ b/docs/ldapAuthBackendUser.java.md @@ -173,6 +173,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -249,6 +250,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/ldapAuthBackendUser.python.md b/docs/ldapAuthBackendUser.python.md index 48fca831..a4b3d9c7 100644 --- a/docs/ldapAuthBackendUser.python.md +++ b/docs/ldapAuthBackendUser.python.md @@ -171,6 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -252,6 +253,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/ldapAuthBackendUser.typescript.md b/docs/ldapAuthBackendUser.typescript.md index dbe3a803..94f3e12b 100644 --- a/docs/ldapAuthBackendUser.typescript.md +++ b/docs/ldapAuthBackendUser.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/ldapSecretBackend.csharp.md b/docs/ldapSecretBackend.csharp.md index 613a3d26..69593fca 100644 --- a/docs/ldapSecretBackend.csharp.md +++ b/docs/ldapSecretBackend.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -153,6 +154,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/ldapSecretBackend.go.md b/docs/ldapSecretBackend.go.md index b26c875e..a2ee3548 100644 --- a/docs/ldapSecretBackend.go.md +++ b/docs/ldapSecretBackend.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackend" ldapsecretbackend.NewLdapSecretBackend(scope Construct, id *string, config LdapSecretBackendConfig) LdapSecretBackend ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -153,6 +154,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -567,7 +574,7 @@ func ResetUserdn() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackend" ldapsecretbackend.LdapSecretBackend_IsConstruct(x interface{}) *bool ``` @@ -599,7 +606,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackend" ldapsecretbackend.LdapSecretBackend_IsTerraformElement(x interface{}) *bool ``` @@ -613,7 +620,7 @@ ldapsecretbackend.LdapSecretBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackend" ldapsecretbackend.LdapSecretBackend_IsTerraformResource(x interface{}) *bool ``` @@ -627,7 +634,7 @@ ldapsecretbackend.LdapSecretBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackend" ldapsecretbackend.LdapSecretBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1527,7 +1534,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackend" &ldapsecretbackend.LdapSecretBackendConfig { Connection: interface{}, diff --git a/docs/ldapSecretBackend.java.md b/docs/ldapSecretBackend.java.md index fda00cda..b167f975 100644 --- a/docs/ldapSecretBackend.java.md +++ b/docs/ldapSecretBackend.java.md @@ -475,6 +475,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -574,6 +575,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/ldapSecretBackend.python.md b/docs/ldapSecretBackend.python.md index bf205df7..5d173f60 100644 --- a/docs/ldapSecretBackend.python.md +++ b/docs/ldapSecretBackend.python.md @@ -467,6 +467,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -571,6 +572,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/ldapSecretBackend.typescript.md b/docs/ldapSecretBackend.typescript.md index a1038f20..70b6c2c2 100644 --- a/docs/ldapSecretBackend.typescript.md +++ b/docs/ldapSecretBackend.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -153,6 +154,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/ldapSecretBackendDynamicRole.csharp.md b/docs/ldapSecretBackendDynamicRole.csharp.md index be350b7d..2499ce0f 100644 --- a/docs/ldapSecretBackendDynamicRole.csharp.md +++ b/docs/ldapSecretBackendDynamicRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -132,6 +133,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/ldapSecretBackendDynamicRole.go.md b/docs/ldapSecretBackendDynamicRole.go.md index b6ee988d..d6dd3d99 100644 --- a/docs/ldapSecretBackendDynamicRole.go.md +++ b/docs/ldapSecretBackendDynamicRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapsecretbackenddynamicrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackenddynamicrole" ldapsecretbackenddynamicrole.NewLdapSecretBackendDynamicRole(scope Construct, id *string, config LdapSecretBackendDynamicRoleConfig) LdapSecretBackendDynamicRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -132,6 +133,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -420,7 +427,7 @@ func ResetUsernameTemplate() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapsecretbackenddynamicrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackenddynamicrole" ldapsecretbackenddynamicrole.LdapSecretBackendDynamicRole_IsConstruct(x interface{}) *bool ``` @@ -452,7 +459,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapsecretbackenddynamicrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackenddynamicrole" ldapsecretbackenddynamicrole.LdapSecretBackendDynamicRole_IsTerraformElement(x interface{}) *bool ``` @@ -466,7 +473,7 @@ ldapsecretbackenddynamicrole.LdapSecretBackendDynamicRole_IsTerraformElement(x i ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapsecretbackenddynamicrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackenddynamicrole" ldapsecretbackenddynamicrole.LdapSecretBackendDynamicRole_IsTerraformResource(x interface{}) *bool ``` @@ -480,7 +487,7 @@ ldapsecretbackenddynamicrole.LdapSecretBackendDynamicRole_IsTerraformResource(x ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapsecretbackenddynamicrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackenddynamicrole" ldapsecretbackenddynamicrole.LdapSecretBackendDynamicRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -929,7 +936,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapsecretbackenddynamicrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackenddynamicrole" &ldapsecretbackenddynamicrole.LdapSecretBackendDynamicRoleConfig { Connection: interface{}, diff --git a/docs/ldapSecretBackendDynamicRole.java.md b/docs/ldapSecretBackendDynamicRole.java.md index 41dcd0ea..293a2fab 100644 --- a/docs/ldapSecretBackendDynamicRole.java.md +++ b/docs/ldapSecretBackendDynamicRole.java.md @@ -235,6 +235,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -313,6 +314,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/ldapSecretBackendDynamicRole.python.md b/docs/ldapSecretBackendDynamicRole.python.md index a42552cc..ff5eb510 100644 --- a/docs/ldapSecretBackendDynamicRole.python.md +++ b/docs/ldapSecretBackendDynamicRole.python.md @@ -233,6 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -316,6 +317,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/ldapSecretBackendDynamicRole.typescript.md b/docs/ldapSecretBackendDynamicRole.typescript.md index 6ed7c530..baf24d0b 100644 --- a/docs/ldapSecretBackendDynamicRole.typescript.md +++ b/docs/ldapSecretBackendDynamicRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -132,6 +133,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/ldapSecretBackendLibrarySet.csharp.md b/docs/ldapSecretBackendLibrarySet.csharp.md index 8f6de65f..1c169fe9 100644 --- a/docs/ldapSecretBackendLibrarySet.csharp.md +++ b/docs/ldapSecretBackendLibrarySet.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/ldapSecretBackendLibrarySet.go.md b/docs/ldapSecretBackendLibrarySet.go.md index c424a503..24959416 100644 --- a/docs/ldapSecretBackendLibrarySet.go.md +++ b/docs/ldapSecretBackendLibrarySet.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapsecretbackendlibraryset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackendlibraryset" ldapsecretbackendlibraryset.NewLdapSecretBackendLibrarySet(scope Construct, id *string, config LdapSecretBackendLibrarySetConfig) LdapSecretBackendLibrarySet ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -413,7 +420,7 @@ func ResetTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapsecretbackendlibraryset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackendlibraryset" ldapsecretbackendlibraryset.LdapSecretBackendLibrarySet_IsConstruct(x interface{}) *bool ``` @@ -445,7 +452,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapsecretbackendlibraryset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackendlibraryset" ldapsecretbackendlibraryset.LdapSecretBackendLibrarySet_IsTerraformElement(x interface{}) *bool ``` @@ -459,7 +466,7 @@ ldapsecretbackendlibraryset.LdapSecretBackendLibrarySet_IsTerraformElement(x int ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapsecretbackendlibraryset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackendlibraryset" ldapsecretbackendlibraryset.LdapSecretBackendLibrarySet_IsTerraformResource(x interface{}) *bool ``` @@ -473,7 +480,7 @@ ldapsecretbackendlibraryset.LdapSecretBackendLibrarySet_IsTerraformResource(x in ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapsecretbackendlibraryset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackendlibraryset" ldapsecretbackendlibraryset.LdapSecretBackendLibrarySet_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -878,7 +885,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapsecretbackendlibraryset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackendlibraryset" &ldapsecretbackendlibraryset.LdapSecretBackendLibrarySetConfig { Connection: interface{}, diff --git a/docs/ldapSecretBackendLibrarySet.java.md b/docs/ldapSecretBackendLibrarySet.java.md index 916d4793..921ec90b 100644 --- a/docs/ldapSecretBackendLibrarySet.java.md +++ b/docs/ldapSecretBackendLibrarySet.java.md @@ -210,6 +210,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -287,6 +288,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/ldapSecretBackendLibrarySet.python.md b/docs/ldapSecretBackendLibrarySet.python.md index c48860a6..d3b60fe0 100644 --- a/docs/ldapSecretBackendLibrarySet.python.md +++ b/docs/ldapSecretBackendLibrarySet.python.md @@ -207,6 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -289,6 +290,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/ldapSecretBackendLibrarySet.typescript.md b/docs/ldapSecretBackendLibrarySet.typescript.md index c0831274..a8883c36 100644 --- a/docs/ldapSecretBackendLibrarySet.typescript.md +++ b/docs/ldapSecretBackendLibrarySet.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/ldapSecretBackendStaticRole.csharp.md b/docs/ldapSecretBackendStaticRole.csharp.md index 7270c35c..39549eb9 100644 --- a/docs/ldapSecretBackendStaticRole.csharp.md +++ b/docs/ldapSecretBackendStaticRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/ldapSecretBackendStaticRole.go.md b/docs/ldapSecretBackendStaticRole.go.md index 35271430..bee10d35 100644 --- a/docs/ldapSecretBackendStaticRole.go.md +++ b/docs/ldapSecretBackendStaticRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapsecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackendstaticrole" ldapsecretbackendstaticrole.NewLdapSecretBackendStaticRole(scope Construct, id *string, config LdapSecretBackendStaticRoleConfig) LdapSecretBackendStaticRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -399,7 +406,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapsecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackendstaticrole" ldapsecretbackendstaticrole.LdapSecretBackendStaticRole_IsConstruct(x interface{}) *bool ``` @@ -431,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapsecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackendstaticrole" ldapsecretbackendstaticrole.LdapSecretBackendStaticRole_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +452,7 @@ ldapsecretbackendstaticrole.LdapSecretBackendStaticRole_IsTerraformElement(x int ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapsecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackendstaticrole" ldapsecretbackendstaticrole.LdapSecretBackendStaticRole_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +466,7 @@ ldapsecretbackendstaticrole.LdapSecretBackendStaticRole_IsTerraformResource(x in ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapsecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackendstaticrole" ldapsecretbackendstaticrole.LdapSecretBackendStaticRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -842,7 +849,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/ldapsecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackendstaticrole" &ldapsecretbackendstaticrole.LdapSecretBackendStaticRoleConfig { Connection: interface{}, diff --git a/docs/ldapSecretBackendStaticRole.java.md b/docs/ldapSecretBackendStaticRole.java.md index 4fbe11d5..12728a1d 100644 --- a/docs/ldapSecretBackendStaticRole.java.md +++ b/docs/ldapSecretBackendStaticRole.java.md @@ -193,6 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -268,6 +269,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/ldapSecretBackendStaticRole.python.md b/docs/ldapSecretBackendStaticRole.python.md index bdfb832c..c63b57d4 100644 --- a/docs/ldapSecretBackendStaticRole.python.md +++ b/docs/ldapSecretBackendStaticRole.python.md @@ -191,6 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -271,6 +272,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/ldapSecretBackendStaticRole.typescript.md b/docs/ldapSecretBackendStaticRole.typescript.md index d460d6b8..75765ab8 100644 --- a/docs/ldapSecretBackendStaticRole.typescript.md +++ b/docs/ldapSecretBackendStaticRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/managedKeys.csharp.md b/docs/managedKeys.csharp.md index 9455f8ab..9ed450fe 100644 --- a/docs/managedKeys.csharp.md +++ b/docs/managedKeys.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -133,6 +134,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp @@ -1800,6 +1807,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1807,6 +1815,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp @@ -2556,6 +2580,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -2563,6 +2588,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp @@ -3334,6 +3375,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -3341,6 +3383,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp diff --git a/docs/managedKeys.go.md b/docs/managedKeys.go.md index a8ff4f09..a1b3294b 100644 --- a/docs/managedKeys.go.md +++ b/docs/managedKeys.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" managedkeys.NewManagedKeys(scope Construct, id *string, config ManagedKeysConfig) ManagedKeys ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -133,6 +134,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -445,7 +452,7 @@ func ResetPkcs() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" managedkeys.ManagedKeys_IsConstruct(x interface{}) *bool ``` @@ -477,7 +484,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" managedkeys.ManagedKeys_IsTerraformElement(x interface{}) *bool ``` @@ -491,7 +498,7 @@ managedkeys.ManagedKeys_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" managedkeys.ManagedKeys_IsTerraformResource(x interface{}) *bool ``` @@ -505,7 +512,7 @@ managedkeys.ManagedKeys_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" managedkeys.ManagedKeys_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -844,7 +851,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" &managedkeys.ManagedKeysAws { AccessKey: *string, @@ -1070,7 +1077,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" &managedkeys.ManagedKeysAzure { ClientId: *string, @@ -1314,7 +1321,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" &managedkeys.ManagedKeysConfig { Connection: interface{}, @@ -1497,7 +1504,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" &managedkeys.ManagedKeysPkcs { KeyId: *string, @@ -1759,7 +1766,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" managedkeys.NewManagedKeysAwsList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) ManagedKeysAwsList ``` @@ -1800,6 +1807,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1807,6 +1815,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -1902,7 +1926,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" managedkeys.NewManagedKeysAwsOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) ManagedKeysAwsOutputReference ``` @@ -2515,7 +2539,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" managedkeys.NewManagedKeysAzureList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) ManagedKeysAzureList ``` @@ -2556,6 +2580,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -2563,6 +2588,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -2658,7 +2699,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" managedkeys.NewManagedKeysAzureOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) ManagedKeysAzureOutputReference ``` @@ -3293,7 +3334,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" managedkeys.NewManagedKeysPkcsList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) ManagedKeysPkcsList ``` @@ -3334,6 +3375,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -3341,6 +3383,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -3436,7 +3494,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" managedkeys.NewManagedKeysPkcsOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) ManagedKeysPkcsOutputReference ``` diff --git a/docs/managedKeys.java.md b/docs/managedKeys.java.md index 5b36f11b..5727c7c2 100644 --- a/docs/managedKeys.java.md +++ b/docs/managedKeys.java.md @@ -172,6 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -251,6 +252,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java @@ -1939,6 +1946,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -1946,6 +1954,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java @@ -2695,6 +2719,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -2702,6 +2727,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java @@ -3473,6 +3514,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -3480,6 +3522,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java diff --git a/docs/managedKeys.python.md b/docs/managedKeys.python.md index 9a2220fa..cf1e431b 100644 --- a/docs/managedKeys.python.md +++ b/docs/managedKeys.python.md @@ -167,6 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -251,6 +252,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python @@ -1971,6 +1978,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -1978,6 +1986,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python @@ -2762,6 +2788,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -2769,6 +2796,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python @@ -3575,6 +3620,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -3582,6 +3628,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python diff --git a/docs/managedKeys.typescript.md b/docs/managedKeys.typescript.md index 762a212c..40edbd68 100644 --- a/docs/managedKeys.typescript.md +++ b/docs/managedKeys.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -133,6 +134,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript @@ -1742,6 +1749,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -1749,6 +1757,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript @@ -2498,6 +2522,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -2505,6 +2530,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript @@ -3276,6 +3317,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -3283,6 +3325,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript diff --git a/docs/mfaDuo.csharp.md b/docs/mfaDuo.csharp.md index cdd8fa9d..5acdb9d3 100644 --- a/docs/mfaDuo.csharp.md +++ b/docs/mfaDuo.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/mfaDuo.go.md b/docs/mfaDuo.go.md index bb71a6ce..d40a3c43 100644 --- a/docs/mfaDuo.go.md +++ b/docs/mfaDuo.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mfaduo" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfaduo" mfaduo.NewMfaDuo(scope Construct, id *string, config MfaDuoConfig) MfaDuo ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -399,7 +406,7 @@ func ResetUsernameFormat() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mfaduo" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfaduo" mfaduo.MfaDuo_IsConstruct(x interface{}) *bool ``` @@ -431,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mfaduo" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfaduo" mfaduo.MfaDuo_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +452,7 @@ mfaduo.MfaDuo_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mfaduo" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfaduo" mfaduo.MfaDuo_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +466,7 @@ mfaduo.MfaDuo_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mfaduo" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfaduo" mfaduo.MfaDuo_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -886,7 +893,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mfaduo" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfaduo" &mfaduo.MfaDuoConfig { Connection: interface{}, diff --git a/docs/mfaDuo.java.md b/docs/mfaDuo.java.md index 596dbc30..b7bb709b 100644 --- a/docs/mfaDuo.java.md +++ b/docs/mfaDuo.java.md @@ -219,6 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -294,6 +295,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/mfaDuo.python.md b/docs/mfaDuo.python.md index fed15df9..7d642adb 100644 --- a/docs/mfaDuo.python.md +++ b/docs/mfaDuo.python.md @@ -217,6 +217,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -297,6 +298,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/mfaDuo.typescript.md b/docs/mfaDuo.typescript.md index 63a18a98..53ccb889 100644 --- a/docs/mfaDuo.typescript.md +++ b/docs/mfaDuo.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/mfaOkta.csharp.md b/docs/mfaOkta.csharp.md index f50415f9..b01079a4 100644 --- a/docs/mfaOkta.csharp.md +++ b/docs/mfaOkta.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/mfaOkta.go.md b/docs/mfaOkta.go.md index cff5fe04..db9f6eba 100644 --- a/docs/mfaOkta.go.md +++ b/docs/mfaOkta.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mfaokta" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfaokta" mfaokta.NewMfaOkta(scope Construct, id *string, config MfaOktaConfig) MfaOkta ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -406,7 +413,7 @@ func ResetUsernameFormat() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mfaokta" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfaokta" mfaokta.MfaOkta_IsConstruct(x interface{}) *bool ``` @@ -438,7 +445,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mfaokta" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfaokta" mfaokta.MfaOkta_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +459,7 @@ mfaokta.MfaOkta_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mfaokta" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfaokta" mfaokta.MfaOkta_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +473,7 @@ mfaokta.MfaOkta_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mfaokta" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfaokta" mfaokta.MfaOkta_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -893,7 +900,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mfaokta" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfaokta" &mfaokta.MfaOktaConfig { Connection: interface{}, diff --git a/docs/mfaOkta.java.md b/docs/mfaOkta.java.md index 3ee159ef..938d1bf7 100644 --- a/docs/mfaOkta.java.md +++ b/docs/mfaOkta.java.md @@ -222,6 +222,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -298,6 +299,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/mfaOkta.python.md b/docs/mfaOkta.python.md index 24a09cae..cf11e7b1 100644 --- a/docs/mfaOkta.python.md +++ b/docs/mfaOkta.python.md @@ -219,6 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -300,6 +301,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/mfaOkta.typescript.md b/docs/mfaOkta.typescript.md index fd8f7a6f..bf6f430c 100644 --- a/docs/mfaOkta.typescript.md +++ b/docs/mfaOkta.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/mfaPingid.csharp.md b/docs/mfaPingid.csharp.md index 029480bc..575b18d5 100644 --- a/docs/mfaPingid.csharp.md +++ b/docs/mfaPingid.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/mfaPingid.go.md b/docs/mfaPingid.go.md index 4d8f66a6..ff280738 100644 --- a/docs/mfaPingid.go.md +++ b/docs/mfaPingid.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mfapingid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfapingid" mfapingid.NewMfaPingid(scope Construct, id *string, config MfaPingidConfig) MfaPingid ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -392,7 +399,7 @@ func ResetUsernameFormat() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mfapingid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfapingid" mfapingid.MfaPingid_IsConstruct(x interface{}) *bool ``` @@ -424,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mfapingid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfapingid" mfapingid.MfaPingid_IsTerraformElement(x interface{}) *bool ``` @@ -438,7 +445,7 @@ mfapingid.MfaPingid_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mfapingid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfapingid" mfapingid.MfaPingid_IsTerraformResource(x interface{}) *bool ``` @@ -452,7 +459,7 @@ mfapingid.MfaPingid_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mfapingid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfapingid" mfapingid.MfaPingid_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -890,7 +897,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mfapingid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfapingid" &mfapingid.MfaPingidConfig { Connection: interface{}, diff --git a/docs/mfaPingid.java.md b/docs/mfaPingid.java.md index 85656b08..fea1f82c 100644 --- a/docs/mfaPingid.java.md +++ b/docs/mfaPingid.java.md @@ -185,6 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -259,6 +260,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/mfaPingid.python.md b/docs/mfaPingid.python.md index c52704c8..d20b4beb 100644 --- a/docs/mfaPingid.python.md +++ b/docs/mfaPingid.python.md @@ -183,6 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -262,6 +263,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/mfaPingid.typescript.md b/docs/mfaPingid.typescript.md index 21507daf..442d72b7 100644 --- a/docs/mfaPingid.typescript.md +++ b/docs/mfaPingid.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/mfaTotp.csharp.md b/docs/mfaTotp.csharp.md index 4dd7db8f..c170dac1 100644 --- a/docs/mfaTotp.csharp.md +++ b/docs/mfaTotp.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -133,6 +134,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/mfaTotp.go.md b/docs/mfaTotp.go.md index 48e0062f..471010ba 100644 --- a/docs/mfaTotp.go.md +++ b/docs/mfaTotp.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mfatotp" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfatotp" mfatotp.NewMfaTotp(scope Construct, id *string, config MfaTotpConfig) MfaTotp ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -133,6 +134,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -427,7 +434,7 @@ func ResetSkew() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mfatotp" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfatotp" mfatotp.MfaTotp_IsConstruct(x interface{}) *bool ``` @@ -459,7 +466,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mfatotp" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfatotp" mfatotp.MfaTotp_IsTerraformElement(x interface{}) *bool ``` @@ -473,7 +480,7 @@ mfatotp.MfaTotp_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mfatotp" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfatotp" mfatotp.MfaTotp_IsTerraformResource(x interface{}) *bool ``` @@ -487,7 +494,7 @@ mfatotp.MfaTotp_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mfatotp" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfatotp" mfatotp.MfaTotp_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -936,7 +943,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mfatotp" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfatotp" &mfatotp.MfaTotpConfig { Connection: interface{}, diff --git a/docs/mfaTotp.java.md b/docs/mfaTotp.java.md index 12f92c74..c3a531c4 100644 --- a/docs/mfaTotp.java.md +++ b/docs/mfaTotp.java.md @@ -233,6 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -312,6 +313,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/mfaTotp.python.md b/docs/mfaTotp.python.md index 983d8cf6..8e0b679e 100644 --- a/docs/mfaTotp.python.md +++ b/docs/mfaTotp.python.md @@ -231,6 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -315,6 +316,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/mfaTotp.typescript.md b/docs/mfaTotp.typescript.md index 0abdb612..649c974f 100644 --- a/docs/mfaTotp.typescript.md +++ b/docs/mfaTotp.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -133,6 +134,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/mongodbatlasSecretBackend.csharp.md b/docs/mongodbatlasSecretBackend.csharp.md index c6079bb3..7bd0eeaf 100644 --- a/docs/mongodbatlasSecretBackend.csharp.md +++ b/docs/mongodbatlasSecretBackend.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/mongodbatlasSecretBackend.go.md b/docs/mongodbatlasSecretBackend.go.md index 8c20fc01..803e2070 100644 --- a/docs/mongodbatlasSecretBackend.go.md +++ b/docs/mongodbatlasSecretBackend.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mongodbatlassecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mongodbatlassecretbackend" mongodbatlassecretbackend.NewMongodbatlasSecretBackend(scope Construct, id *string, config MongodbatlasSecretBackendConfig) MongodbatlasSecretBackend ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -385,7 +392,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mongodbatlassecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mongodbatlassecretbackend" mongodbatlassecretbackend.MongodbatlasSecretBackend_IsConstruct(x interface{}) *bool ``` @@ -417,7 +424,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mongodbatlassecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mongodbatlassecretbackend" mongodbatlassecretbackend.MongodbatlasSecretBackend_IsTerraformElement(x interface{}) *bool ``` @@ -431,7 +438,7 @@ mongodbatlassecretbackend.MongodbatlasSecretBackend_IsTerraformElement(x interfa ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mongodbatlassecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mongodbatlassecretbackend" mongodbatlassecretbackend.MongodbatlasSecretBackend_IsTerraformResource(x interface{}) *bool ``` @@ -445,7 +452,7 @@ mongodbatlassecretbackend.MongodbatlasSecretBackend_IsTerraformResource(x interf ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mongodbatlassecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mongodbatlassecretbackend" mongodbatlassecretbackend.MongodbatlasSecretBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -795,7 +802,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mongodbatlassecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mongodbatlassecretbackend" &mongodbatlassecretbackend.MongodbatlasSecretBackendConfig { Connection: interface{}, diff --git a/docs/mongodbatlasSecretBackend.java.md b/docs/mongodbatlasSecretBackend.java.md index 617e274c..c5dae01c 100644 --- a/docs/mongodbatlasSecretBackend.java.md +++ b/docs/mongodbatlasSecretBackend.java.md @@ -169,6 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -242,6 +243,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/mongodbatlasSecretBackend.python.md b/docs/mongodbatlasSecretBackend.python.md index 8c29d069..5901020a 100644 --- a/docs/mongodbatlasSecretBackend.python.md +++ b/docs/mongodbatlasSecretBackend.python.md @@ -167,6 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -245,6 +246,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/mongodbatlasSecretBackend.typescript.md b/docs/mongodbatlasSecretBackend.typescript.md index d2cba29a..a7e4ad38 100644 --- a/docs/mongodbatlasSecretBackend.typescript.md +++ b/docs/mongodbatlasSecretBackend.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/mongodbatlasSecretRole.csharp.md b/docs/mongodbatlasSecretRole.csharp.md index 8e8d6199..9ff1eeb9 100644 --- a/docs/mongodbatlasSecretRole.csharp.md +++ b/docs/mongodbatlasSecretRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -134,6 +135,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/mongodbatlasSecretRole.go.md b/docs/mongodbatlasSecretRole.go.md index 4b9b731a..059491ce 100644 --- a/docs/mongodbatlasSecretRole.go.md +++ b/docs/mongodbatlasSecretRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mongodbatlassecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mongodbatlassecretrole" mongodbatlassecretrole.NewMongodbatlasSecretRole(scope Construct, id *string, config MongodbatlasSecretRoleConfig) MongodbatlasSecretRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -134,6 +135,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -434,7 +441,7 @@ func ResetTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mongodbatlassecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mongodbatlassecretrole" mongodbatlassecretrole.MongodbatlasSecretRole_IsConstruct(x interface{}) *bool ``` @@ -466,7 +473,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mongodbatlassecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mongodbatlassecretrole" mongodbatlassecretrole.MongodbatlasSecretRole_IsTerraformElement(x interface{}) *bool ``` @@ -480,7 +487,7 @@ mongodbatlassecretrole.MongodbatlasSecretRole_IsTerraformElement(x interface{}) ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mongodbatlassecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mongodbatlassecretrole" mongodbatlassecretrole.MongodbatlasSecretRole_IsTerraformResource(x interface{}) *bool ``` @@ -494,7 +501,7 @@ mongodbatlassecretrole.MongodbatlasSecretRole_IsTerraformResource(x interface{}) ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mongodbatlassecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mongodbatlassecretrole" mongodbatlassecretrole.MongodbatlasSecretRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -987,7 +994,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mongodbatlassecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mongodbatlassecretrole" &mongodbatlassecretrole.MongodbatlasSecretRoleConfig { Connection: interface{}, diff --git a/docs/mongodbatlasSecretRole.java.md b/docs/mongodbatlasSecretRole.java.md index 456cc76e..96c61c14 100644 --- a/docs/mongodbatlasSecretRole.java.md +++ b/docs/mongodbatlasSecretRole.java.md @@ -253,6 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -333,6 +334,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/mongodbatlasSecretRole.python.md b/docs/mongodbatlasSecretRole.python.md index 660c8508..63de70b7 100644 --- a/docs/mongodbatlasSecretRole.python.md +++ b/docs/mongodbatlasSecretRole.python.md @@ -251,6 +251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -336,6 +337,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/mongodbatlasSecretRole.typescript.md b/docs/mongodbatlasSecretRole.typescript.md index 90a1cee4..7408c8b7 100644 --- a/docs/mongodbatlasSecretRole.typescript.md +++ b/docs/mongodbatlasSecretRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -134,6 +135,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/mount.csharp.md b/docs/mount.csharp.md index 4580c45e..b4d980dd 100644 --- a/docs/mount.csharp.md +++ b/docs/mount.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -137,6 +138,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/mount.go.md b/docs/mount.go.md index 62627e68..8ad0c8d2 100644 --- a/docs/mount.go.md +++ b/docs/mount.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mount" mount.NewMount(scope Construct, id *string, config MountConfig) Mount ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -137,6 +138,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -455,7 +462,7 @@ func ResetSealWrap() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mount" mount.Mount_IsConstruct(x interface{}) *bool ``` @@ -487,7 +494,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mount" mount.Mount_IsTerraformElement(x interface{}) *bool ``` @@ -501,7 +508,7 @@ mount.Mount_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mount" mount.Mount_IsTerraformResource(x interface{}) *bool ``` @@ -515,7 +522,7 @@ mount.Mount_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mount" mount.Mount_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1063,7 +1070,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/mount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mount" &mount.MountConfig { Connection: interface{}, diff --git a/docs/mount.java.md b/docs/mount.java.md index 88aa074d..3d3c85da 100644 --- a/docs/mount.java.md +++ b/docs/mount.java.md @@ -280,6 +280,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -363,6 +364,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/mount.python.md b/docs/mount.python.md index 8ee7dd21..8959f9ed 100644 --- a/docs/mount.python.md +++ b/docs/mount.python.md @@ -275,6 +275,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -363,6 +364,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/mount.typescript.md b/docs/mount.typescript.md index c7054f24..8ce1bddf 100644 --- a/docs/mount.typescript.md +++ b/docs/mount.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -137,6 +138,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/namespace.csharp.md b/docs/namespace.csharp.md index 2db573a7..5c5c9912 100644 --- a/docs/namespace.csharp.md +++ b/docs/namespace.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/namespace.go.md b/docs/namespace.go.md index 93d3af06..f5c7ad1e 100644 --- a/docs/namespace.go.md +++ b/docs/namespace.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/namespace" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/namespace" namespace.NewNamespace(scope Construct, id *string, config NamespaceConfig) Namespace ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -399,7 +406,7 @@ func ResetPathFq() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/namespace" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/namespace" namespace.Namespace_IsConstruct(x interface{}) *bool ``` @@ -431,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/namespace" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/namespace" namespace.Namespace_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +452,7 @@ namespace.Namespace_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/namespace" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/namespace" namespace.Namespace_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +466,7 @@ namespace.Namespace_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/namespace" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/namespace" namespace.Namespace_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -809,7 +816,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/namespace" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/namespace" &namespace.NamespaceConfig { Connection: interface{}, diff --git a/docs/namespace.java.md b/docs/namespace.java.md index 951162b6..86bc67ea 100644 --- a/docs/namespace.java.md +++ b/docs/namespace.java.md @@ -169,6 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -244,6 +245,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/namespace.python.md b/docs/namespace.python.md index cff9d72d..46b052ff 100644 --- a/docs/namespace.python.md +++ b/docs/namespace.python.md @@ -167,6 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -247,6 +248,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/namespace.typescript.md b/docs/namespace.typescript.md index e5383496..e6a675a9 100644 --- a/docs/namespace.typescript.md +++ b/docs/namespace.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/nomadSecretBackend.csharp.md b/docs/nomadSecretBackend.csharp.md index 339f9fca..3104203b 100644 --- a/docs/nomadSecretBackend.csharp.md +++ b/docs/nomadSecretBackend.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -141,6 +142,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/nomadSecretBackend.go.md b/docs/nomadSecretBackend.go.md index 5e5060ac..129d049d 100644 --- a/docs/nomadSecretBackend.go.md +++ b/docs/nomadSecretBackend.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/nomadsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/nomadsecretbackend" nomadsecretbackend.NewNomadSecretBackend(scope Construct, id *string, config NomadSecretBackendConfig) NomadSecretBackend ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -141,6 +142,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -483,7 +490,7 @@ func ResetTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/nomadsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/nomadsecretbackend" nomadsecretbackend.NomadSecretBackend_IsConstruct(x interface{}) *bool ``` @@ -515,7 +522,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/nomadsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/nomadsecretbackend" nomadsecretbackend.NomadSecretBackend_IsTerraformElement(x interface{}) *bool ``` @@ -529,7 +536,7 @@ nomadsecretbackend.NomadSecretBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/nomadsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/nomadsecretbackend" nomadsecretbackend.NomadSecretBackend_IsTerraformResource(x interface{}) *bool ``` @@ -543,7 +550,7 @@ nomadsecretbackend.NomadSecretBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/nomadsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/nomadsecretbackend" nomadsecretbackend.NomadSecretBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1124,7 +1131,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/nomadsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/nomadsecretbackend" &nomadsecretbackend.NomadSecretBackendConfig { Connection: interface{}, diff --git a/docs/nomadSecretBackend.java.md b/docs/nomadSecretBackend.java.md index b0cc7e2c..d334b24a 100644 --- a/docs/nomadSecretBackend.java.md +++ b/docs/nomadSecretBackend.java.md @@ -307,6 +307,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -394,6 +395,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/nomadSecretBackend.python.md b/docs/nomadSecretBackend.python.md index 1a37c7e8..a40da666 100644 --- a/docs/nomadSecretBackend.python.md +++ b/docs/nomadSecretBackend.python.md @@ -303,6 +303,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -395,6 +396,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/nomadSecretBackend.typescript.md b/docs/nomadSecretBackend.typescript.md index ad852a98..99b0e320 100644 --- a/docs/nomadSecretBackend.typescript.md +++ b/docs/nomadSecretBackend.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -141,6 +142,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/nomadSecretRole.csharp.md b/docs/nomadSecretRole.csharp.md index 0238c78d..07baf8e0 100644 --- a/docs/nomadSecretRole.csharp.md +++ b/docs/nomadSecretRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/nomadSecretRole.go.md b/docs/nomadSecretRole.go.md index 62cf80c9..cd34bcde 100644 --- a/docs/nomadSecretRole.go.md +++ b/docs/nomadSecretRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/nomadsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/nomadsecretrole" nomadsecretrole.NewNomadSecretRole(scope Construct, id *string, config NomadSecretRoleConfig) NomadSecretRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -406,7 +413,7 @@ func ResetType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/nomadsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/nomadsecretrole" nomadsecretrole.NomadSecretRole_IsConstruct(x interface{}) *bool ``` @@ -438,7 +445,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/nomadsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/nomadsecretrole" nomadsecretrole.NomadSecretRole_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +459,7 @@ nomadsecretrole.NomadSecretRole_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/nomadsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/nomadsecretrole" nomadsecretrole.NomadSecretRole_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +473,7 @@ nomadsecretrole.NomadSecretRole_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/nomadsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/nomadsecretrole" nomadsecretrole.NomadSecretRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -849,7 +856,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/nomadsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/nomadsecretrole" &nomadsecretrole.NomadSecretRoleConfig { Connection: interface{}, diff --git a/docs/nomadSecretRole.java.md b/docs/nomadSecretRole.java.md index 7af0d132..c6dc0885 100644 --- a/docs/nomadSecretRole.java.md +++ b/docs/nomadSecretRole.java.md @@ -196,6 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -272,6 +273,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/nomadSecretRole.python.md b/docs/nomadSecretRole.python.md index 58ebe0a0..ce218cbf 100644 --- a/docs/nomadSecretRole.python.md +++ b/docs/nomadSecretRole.python.md @@ -193,6 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -274,6 +275,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/nomadSecretRole.typescript.md b/docs/nomadSecretRole.typescript.md index 05da4350..244cb71d 100644 --- a/docs/nomadSecretRole.typescript.md +++ b/docs/nomadSecretRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/oktaAuthBackend.csharp.md b/docs/oktaAuthBackend.csharp.md index 5c658bd6..7ed235c1 100644 --- a/docs/oktaAuthBackend.csharp.md +++ b/docs/oktaAuthBackend.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -139,6 +140,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp @@ -1527,6 +1534,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1534,6 +1542,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp @@ -1995,6 +2019,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -2002,6 +2027,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp diff --git a/docs/oktaAuthBackend.go.md b/docs/oktaAuthBackend.go.md index e3bca1bc..f2204b20 100644 --- a/docs/oktaAuthBackend.go.md +++ b/docs/oktaAuthBackend.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/oktaauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackend" oktaauthbackend.NewOktaAuthBackend(scope Construct, id *string, config OktaAuthBackendConfig) OktaAuthBackend ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -139,6 +140,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -481,7 +488,7 @@ func ResetUser() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/oktaauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackend" oktaauthbackend.OktaAuthBackend_IsConstruct(x interface{}) *bool ``` @@ -513,7 +520,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/oktaauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackend" oktaauthbackend.OktaAuthBackend_IsTerraformElement(x interface{}) *bool ``` @@ -527,7 +534,7 @@ oktaauthbackend.OktaAuthBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/oktaauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackend" oktaauthbackend.OktaAuthBackend_IsTerraformResource(x interface{}) *bool ``` @@ -541,7 +548,7 @@ oktaauthbackend.OktaAuthBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/oktaauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackend" oktaauthbackend.OktaAuthBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1067,7 +1074,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/oktaauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackend" &oktaauthbackend.OktaAuthBackendConfig { Connection: interface{}, @@ -1378,7 +1385,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/oktaauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackend" &oktaauthbackend.OktaAuthBackendGroup { GroupName: *string, @@ -1424,7 +1431,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/oktaauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackend" &oktaauthbackend.OktaAuthBackendUser { Groups: *[]*string, @@ -1486,7 +1493,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/oktaauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackend" oktaauthbackend.NewOktaAuthBackendGroupList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) OktaAuthBackendGroupList ``` @@ -1527,6 +1534,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1534,6 +1542,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -1629,7 +1653,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/oktaauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackend" oktaauthbackend.NewOktaAuthBackendGroupOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) OktaAuthBackendGroupOutputReference ``` @@ -1954,7 +1978,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/oktaauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackend" oktaauthbackend.NewOktaAuthBackendUserList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) OktaAuthBackendUserList ``` @@ -1995,6 +2019,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -2002,6 +2027,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -2097,7 +2138,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/oktaauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackend" oktaauthbackend.NewOktaAuthBackendUserOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) OktaAuthBackendUserOutputReference ``` diff --git a/docs/oktaAuthBackend.java.md b/docs/oktaAuthBackend.java.md index 8960ca28..c9f28fe6 100644 --- a/docs/oktaAuthBackend.java.md +++ b/docs/oktaAuthBackend.java.md @@ -269,6 +269,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -354,6 +355,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java @@ -1752,6 +1759,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -1759,6 +1767,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java @@ -2220,6 +2244,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -2227,6 +2252,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java diff --git a/docs/oktaAuthBackend.python.md b/docs/oktaAuthBackend.python.md index 338417c6..ac1639d6 100644 --- a/docs/oktaAuthBackend.python.md +++ b/docs/oktaAuthBackend.python.md @@ -263,6 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -353,6 +354,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python @@ -1792,6 +1799,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -1799,6 +1807,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python @@ -2295,6 +2321,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -2302,6 +2329,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python diff --git a/docs/oktaAuthBackend.typescript.md b/docs/oktaAuthBackend.typescript.md index bdd504bd..86602f77 100644 --- a/docs/oktaAuthBackend.typescript.md +++ b/docs/oktaAuthBackend.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -139,6 +140,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript @@ -1499,6 +1506,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -1506,6 +1514,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript @@ -1967,6 +1991,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -1974,6 +1999,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript diff --git a/docs/oktaAuthBackendGroup.csharp.md b/docs/oktaAuthBackendGroup.csharp.md index fb22cc24..5a7353b0 100644 --- a/docs/oktaAuthBackendGroup.csharp.md +++ b/docs/oktaAuthBackendGroup.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/oktaAuthBackendGroup.go.md b/docs/oktaAuthBackendGroup.go.md index a2c90d01..97861e1e 100644 --- a/docs/oktaAuthBackendGroup.go.md +++ b/docs/oktaAuthBackendGroup.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/oktaauthbackendgroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackendgroup" oktaauthbackendgroup.NewOktaAuthBackendGroupA(scope Construct, id *string, config OktaAuthBackendGroupAConfig) OktaAuthBackendGroupA ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -392,7 +399,7 @@ func ResetPolicies() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/oktaauthbackendgroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackendgroup" oktaauthbackendgroup.OktaAuthBackendGroupA_IsConstruct(x interface{}) *bool ``` @@ -424,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/oktaauthbackendgroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackendgroup" oktaauthbackendgroup.OktaAuthBackendGroupA_IsTerraformElement(x interface{}) *bool ``` @@ -438,7 +445,7 @@ oktaauthbackendgroup.OktaAuthBackendGroupA_IsTerraformElement(x interface{}) *bo ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/oktaauthbackendgroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackendgroup" oktaauthbackendgroup.OktaAuthBackendGroupA_IsTerraformResource(x interface{}) *bool ``` @@ -452,7 +459,7 @@ oktaauthbackendgroup.OktaAuthBackendGroupA_IsTerraformResource(x interface{}) *b ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/oktaauthbackendgroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackendgroup" oktaauthbackendgroup.OktaAuthBackendGroupA_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -791,7 +798,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/oktaauthbackendgroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackendgroup" &oktaauthbackendgroup.OktaAuthBackendGroupAConfig { Connection: interface{}, diff --git a/docs/oktaAuthBackendGroup.java.md b/docs/oktaAuthBackendGroup.java.md index c66e9374..5ba1f449 100644 --- a/docs/oktaAuthBackendGroup.java.md +++ b/docs/oktaAuthBackendGroup.java.md @@ -169,6 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -243,6 +244,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/oktaAuthBackendGroup.python.md b/docs/oktaAuthBackendGroup.python.md index aa4c269e..6418fe7f 100644 --- a/docs/oktaAuthBackendGroup.python.md +++ b/docs/oktaAuthBackendGroup.python.md @@ -167,6 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -246,6 +247,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/oktaAuthBackendGroup.typescript.md b/docs/oktaAuthBackendGroup.typescript.md index 78631133..7e3e2a25 100644 --- a/docs/oktaAuthBackendGroup.typescript.md +++ b/docs/oktaAuthBackendGroup.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/oktaAuthBackendUser.csharp.md b/docs/oktaAuthBackendUser.csharp.md index 569ed071..27282b49 100644 --- a/docs/oktaAuthBackendUser.csharp.md +++ b/docs/oktaAuthBackendUser.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/oktaAuthBackendUser.go.md b/docs/oktaAuthBackendUser.go.md index 4988d780..1306aa0c 100644 --- a/docs/oktaAuthBackendUser.go.md +++ b/docs/oktaAuthBackendUser.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/oktaauthbackenduser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackenduser" oktaauthbackenduser.NewOktaAuthBackendUserA(scope Construct, id *string, config OktaAuthBackendUserAConfig) OktaAuthBackendUserA ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -399,7 +406,7 @@ func ResetPolicies() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/oktaauthbackenduser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackenduser" oktaauthbackenduser.OktaAuthBackendUserA_IsConstruct(x interface{}) *bool ``` @@ -431,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/oktaauthbackenduser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackenduser" oktaauthbackenduser.OktaAuthBackendUserA_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +452,7 @@ oktaauthbackenduser.OktaAuthBackendUserA_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/oktaauthbackenduser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackenduser" oktaauthbackenduser.OktaAuthBackendUserA_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +466,7 @@ oktaauthbackenduser.OktaAuthBackendUserA_IsTerraformResource(x interface{}) *boo ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/oktaauthbackenduser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackenduser" oktaauthbackenduser.OktaAuthBackendUserA_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -820,7 +827,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/oktaauthbackenduser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackenduser" &oktaauthbackenduser.OktaAuthBackendUserAConfig { Connection: interface{}, diff --git a/docs/oktaAuthBackendUser.java.md b/docs/oktaAuthBackendUser.java.md index 64f2ae4d..0d6a4c76 100644 --- a/docs/oktaAuthBackendUser.java.md +++ b/docs/oktaAuthBackendUser.java.md @@ -181,6 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -256,6 +257,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/oktaAuthBackendUser.python.md b/docs/oktaAuthBackendUser.python.md index d18d0c99..e5ff893e 100644 --- a/docs/oktaAuthBackendUser.python.md +++ b/docs/oktaAuthBackendUser.python.md @@ -179,6 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -259,6 +260,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/oktaAuthBackendUser.typescript.md b/docs/oktaAuthBackendUser.typescript.md index c668c927..681959d4 100644 --- a/docs/oktaAuthBackendUser.typescript.md +++ b/docs/oktaAuthBackendUser.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/passwordPolicy.csharp.md b/docs/passwordPolicy.csharp.md index 11c5964c..f5471de3 100644 --- a/docs/passwordPolicy.csharp.md +++ b/docs/passwordPolicy.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/passwordPolicy.go.md b/docs/passwordPolicy.go.md index 9b148228..18caab6e 100644 --- a/docs/passwordPolicy.go.md +++ b/docs/passwordPolicy.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/passwordpolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/passwordpolicy" passwordpolicy.NewPasswordPolicy(scope Construct, id *string, config PasswordPolicyConfig) PasswordPolicy ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -385,7 +392,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/passwordpolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/passwordpolicy" passwordpolicy.PasswordPolicy_IsConstruct(x interface{}) *bool ``` @@ -417,7 +424,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/passwordpolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/passwordpolicy" passwordpolicy.PasswordPolicy_IsTerraformElement(x interface{}) *bool ``` @@ -431,7 +438,7 @@ passwordpolicy.PasswordPolicy_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/passwordpolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/passwordpolicy" passwordpolicy.PasswordPolicy_IsTerraformResource(x interface{}) *bool ``` @@ -445,7 +452,7 @@ passwordpolicy.PasswordPolicy_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/passwordpolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/passwordpolicy" passwordpolicy.PasswordPolicy_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -762,7 +769,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/passwordpolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/passwordpolicy" &passwordpolicy.PasswordPolicyConfig { Connection: interface{}, diff --git a/docs/passwordPolicy.java.md b/docs/passwordPolicy.java.md index af6327f5..d49709a2 100644 --- a/docs/passwordPolicy.java.md +++ b/docs/passwordPolicy.java.md @@ -157,6 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -230,6 +231,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/passwordPolicy.python.md b/docs/passwordPolicy.python.md index 31cf95c3..5751e699 100644 --- a/docs/passwordPolicy.python.md +++ b/docs/passwordPolicy.python.md @@ -155,6 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -233,6 +234,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/passwordPolicy.typescript.md b/docs/passwordPolicy.typescript.md index 9f4eb92b..d989ef7e 100644 --- a/docs/passwordPolicy.typescript.md +++ b/docs/passwordPolicy.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/pkiSecretBackendCert.csharp.md b/docs/pkiSecretBackendCert.csharp.md index 3bfc2219..92e5e1fe 100644 --- a/docs/pkiSecretBackendCert.csharp.md +++ b/docs/pkiSecretBackendCert.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -140,6 +141,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/pkiSecretBackendCert.go.md b/docs/pkiSecretBackendCert.go.md index 0bf03a9e..d9d93fb2 100644 --- a/docs/pkiSecretBackendCert.go.md +++ b/docs/pkiSecretBackendCert.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendcert" pkisecretbackendcert.NewPkiSecretBackendCert(scope Construct, id *string, config PkiSecretBackendCertConfig) PkiSecretBackendCert ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -140,6 +141,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -476,7 +483,7 @@ func ResetUserIds() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendcert" pkisecretbackendcert.PkiSecretBackendCert_IsConstruct(x interface{}) *bool ``` @@ -508,7 +515,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendcert" pkisecretbackendcert.PkiSecretBackendCert_IsTerraformElement(x interface{}) *bool ``` @@ -522,7 +529,7 @@ pkisecretbackendcert.PkiSecretBackendCert_IsTerraformElement(x interface{}) *boo ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendcert" pkisecretbackendcert.PkiSecretBackendCert_IsTerraformResource(x interface{}) *bool ``` @@ -536,7 +543,7 @@ pkisecretbackendcert.PkiSecretBackendCert_IsTerraformResource(x interface{}) *bo ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendcert" pkisecretbackendcert.PkiSecretBackendCert_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1249,7 +1256,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendcert" &pkisecretbackendcert.PkiSecretBackendCertConfig { Connection: interface{}, diff --git a/docs/pkiSecretBackendCert.java.md b/docs/pkiSecretBackendCert.java.md index 6603e7b8..bbd92a7d 100644 --- a/docs/pkiSecretBackendCert.java.md +++ b/docs/pkiSecretBackendCert.java.md @@ -328,6 +328,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -414,6 +415,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/pkiSecretBackendCert.python.md b/docs/pkiSecretBackendCert.python.md index 05134276..d945f1ac 100644 --- a/docs/pkiSecretBackendCert.python.md +++ b/docs/pkiSecretBackendCert.python.md @@ -323,6 +323,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -414,6 +415,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/pkiSecretBackendCert.typescript.md b/docs/pkiSecretBackendCert.typescript.md index 8cdad675..c1d4b38d 100644 --- a/docs/pkiSecretBackendCert.typescript.md +++ b/docs/pkiSecretBackendCert.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -140,6 +141,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/pkiSecretBackendConfigCa.csharp.md b/docs/pkiSecretBackendConfigCa.csharp.md index 3f61abed..7b4bd29d 100644 --- a/docs/pkiSecretBackendConfigCa.csharp.md +++ b/docs/pkiSecretBackendConfigCa.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/pkiSecretBackendConfigCa.go.md b/docs/pkiSecretBackendConfigCa.go.md index eb6dd3d4..0b51ace2 100644 --- a/docs/pkiSecretBackendConfigCa.go.md +++ b/docs/pkiSecretBackendConfigCa.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendconfigca" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigca" pkisecretbackendconfigca.NewPkiSecretBackendConfigCa(scope Construct, id *string, config PkiSecretBackendConfigCaConfig) PkiSecretBackendConfigCa ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -385,7 +392,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendconfigca" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigca" pkisecretbackendconfigca.PkiSecretBackendConfigCa_IsConstruct(x interface{}) *bool ``` @@ -417,7 +424,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendconfigca" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigca" pkisecretbackendconfigca.PkiSecretBackendConfigCa_IsTerraformElement(x interface{}) *bool ``` @@ -431,7 +438,7 @@ pkisecretbackendconfigca.PkiSecretBackendConfigCa_IsTerraformElement(x interface ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendconfigca" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigca" pkisecretbackendconfigca.PkiSecretBackendConfigCa_IsTerraformResource(x interface{}) *bool ``` @@ -445,7 +452,7 @@ pkisecretbackendconfigca.PkiSecretBackendConfigCa_IsTerraformResource(x interfac ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendconfigca" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigca" pkisecretbackendconfigca.PkiSecretBackendConfigCa_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -762,7 +769,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendconfigca" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigca" &pkisecretbackendconfigca.PkiSecretBackendConfigCaConfig { Connection: interface{}, diff --git a/docs/pkiSecretBackendConfigCa.java.md b/docs/pkiSecretBackendConfigCa.java.md index b06eccc2..ec4a4bdc 100644 --- a/docs/pkiSecretBackendConfigCa.java.md +++ b/docs/pkiSecretBackendConfigCa.java.md @@ -157,6 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -230,6 +231,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/pkiSecretBackendConfigCa.python.md b/docs/pkiSecretBackendConfigCa.python.md index 9b64b903..ee78dd9c 100644 --- a/docs/pkiSecretBackendConfigCa.python.md +++ b/docs/pkiSecretBackendConfigCa.python.md @@ -155,6 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -233,6 +234,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/pkiSecretBackendConfigCa.typescript.md b/docs/pkiSecretBackendConfigCa.typescript.md index ec0ce37f..5d55b13f 100644 --- a/docs/pkiSecretBackendConfigCa.typescript.md +++ b/docs/pkiSecretBackendConfigCa.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/pkiSecretBackendConfigIssuers.csharp.md b/docs/pkiSecretBackendConfigIssuers.csharp.md index 5b44b4f4..42ef0cc7 100644 --- a/docs/pkiSecretBackendConfigIssuers.csharp.md +++ b/docs/pkiSecretBackendConfigIssuers.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/pkiSecretBackendConfigIssuers.go.md b/docs/pkiSecretBackendConfigIssuers.go.md index 84ae3a6a..3ec95a61 100644 --- a/docs/pkiSecretBackendConfigIssuers.go.md +++ b/docs/pkiSecretBackendConfigIssuers.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendconfigissuers" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigissuers" pkisecretbackendconfigissuers.NewPkiSecretBackendConfigIssuers(scope Construct, id *string, config PkiSecretBackendConfigIssuersConfig) PkiSecretBackendConfigIssuers ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -399,7 +406,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendconfigissuers" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigissuers" pkisecretbackendconfigissuers.PkiSecretBackendConfigIssuers_IsConstruct(x interface{}) *bool ``` @@ -431,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendconfigissuers" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigissuers" pkisecretbackendconfigissuers.PkiSecretBackendConfigIssuers_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +452,7 @@ pkisecretbackendconfigissuers.PkiSecretBackendConfigIssuers_IsTerraformElement(x ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendconfigissuers" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigissuers" pkisecretbackendconfigissuers.PkiSecretBackendConfigIssuers_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +466,7 @@ pkisecretbackendconfigissuers.PkiSecretBackendConfigIssuers_IsTerraformResource( ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendconfigissuers" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigissuers" pkisecretbackendconfigissuers.PkiSecretBackendConfigIssuers_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -798,7 +805,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendconfigissuers" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigissuers" &pkisecretbackendconfigissuers.PkiSecretBackendConfigIssuersConfig { Connection: interface{}, diff --git a/docs/pkiSecretBackendConfigIssuers.java.md b/docs/pkiSecretBackendConfigIssuers.java.md index 7b300e00..ca8944b8 100644 --- a/docs/pkiSecretBackendConfigIssuers.java.md +++ b/docs/pkiSecretBackendConfigIssuers.java.md @@ -170,6 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -245,6 +246,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/pkiSecretBackendConfigIssuers.python.md b/docs/pkiSecretBackendConfigIssuers.python.md index 80c26a7f..563104bd 100644 --- a/docs/pkiSecretBackendConfigIssuers.python.md +++ b/docs/pkiSecretBackendConfigIssuers.python.md @@ -167,6 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -247,6 +248,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/pkiSecretBackendConfigIssuers.typescript.md b/docs/pkiSecretBackendConfigIssuers.typescript.md index 8fabe90d..7fedf06c 100644 --- a/docs/pkiSecretBackendConfigIssuers.typescript.md +++ b/docs/pkiSecretBackendConfigIssuers.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/pkiSecretBackendConfigUrls.csharp.md b/docs/pkiSecretBackendConfigUrls.csharp.md index a281b5a7..5a02a794 100644 --- a/docs/pkiSecretBackendConfigUrls.csharp.md +++ b/docs/pkiSecretBackendConfigUrls.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/pkiSecretBackendConfigUrls.go.md b/docs/pkiSecretBackendConfigUrls.go.md index 0a805716..3d8edcd7 100644 --- a/docs/pkiSecretBackendConfigUrls.go.md +++ b/docs/pkiSecretBackendConfigUrls.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendconfigurls" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigurls" pkisecretbackendconfigurls.NewPkiSecretBackendConfigUrls(scope Construct, id *string, config PkiSecretBackendConfigUrlsConfig) PkiSecretBackendConfigUrls ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -406,7 +413,7 @@ func ResetOcspServers() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendconfigurls" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigurls" pkisecretbackendconfigurls.PkiSecretBackendConfigUrls_IsConstruct(x interface{}) *bool ``` @@ -438,7 +445,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendconfigurls" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigurls" pkisecretbackendconfigurls.PkiSecretBackendConfigUrls_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +459,7 @@ pkisecretbackendconfigurls.PkiSecretBackendConfigUrls_IsTerraformElement(x inter ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendconfigurls" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigurls" pkisecretbackendconfigurls.PkiSecretBackendConfigUrls_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +473,7 @@ pkisecretbackendconfigurls.PkiSecretBackendConfigUrls_IsTerraformResource(x inte ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendconfigurls" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigurls" pkisecretbackendconfigurls.PkiSecretBackendConfigUrls_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -827,7 +834,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendconfigurls" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigurls" &pkisecretbackendconfigurls.PkiSecretBackendConfigUrlsConfig { Connection: interface{}, diff --git a/docs/pkiSecretBackendConfigUrls.java.md b/docs/pkiSecretBackendConfigUrls.java.md index fdc7e568..8d20a7a3 100644 --- a/docs/pkiSecretBackendConfigUrls.java.md +++ b/docs/pkiSecretBackendConfigUrls.java.md @@ -181,6 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -257,6 +258,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/pkiSecretBackendConfigUrls.python.md b/docs/pkiSecretBackendConfigUrls.python.md index 713f0715..324a8b2b 100644 --- a/docs/pkiSecretBackendConfigUrls.python.md +++ b/docs/pkiSecretBackendConfigUrls.python.md @@ -179,6 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -260,6 +261,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/pkiSecretBackendConfigUrls.typescript.md b/docs/pkiSecretBackendConfigUrls.typescript.md index 28e68267..353c54e4 100644 --- a/docs/pkiSecretBackendConfigUrls.typescript.md +++ b/docs/pkiSecretBackendConfigUrls.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -130,6 +131,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/pkiSecretBackendCrlConfig.csharp.md b/docs/pkiSecretBackendCrlConfig.csharp.md index 36025eb5..18c7fbd5 100644 --- a/docs/pkiSecretBackendCrlConfig.csharp.md +++ b/docs/pkiSecretBackendCrlConfig.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -138,6 +139,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/pkiSecretBackendCrlConfig.go.md b/docs/pkiSecretBackendCrlConfig.go.md index 0d3caa47..364488af 100644 --- a/docs/pkiSecretBackendCrlConfig.go.md +++ b/docs/pkiSecretBackendCrlConfig.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendcrlconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendcrlconfig" pkisecretbackendcrlconfig.NewPkiSecretBackendCrlConfig(scope Construct, id *string, config PkiSecretBackendCrlConfigConfig) PkiSecretBackendCrlConfig ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -138,6 +139,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -462,7 +469,7 @@ func ResetUnifiedCrlOnExistingPaths() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendcrlconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendcrlconfig" pkisecretbackendcrlconfig.PkiSecretBackendCrlConfig_IsConstruct(x interface{}) *bool ``` @@ -494,7 +501,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendcrlconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendcrlconfig" pkisecretbackendcrlconfig.PkiSecretBackendCrlConfig_IsTerraformElement(x interface{}) *bool ``` @@ -508,7 +515,7 @@ pkisecretbackendcrlconfig.PkiSecretBackendCrlConfig_IsTerraformElement(x interfa ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendcrlconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendcrlconfig" pkisecretbackendcrlconfig.PkiSecretBackendCrlConfig_IsTerraformResource(x interface{}) *bool ``` @@ -522,7 +529,7 @@ pkisecretbackendcrlconfig.PkiSecretBackendCrlConfig_IsTerraformResource(x interf ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendcrlconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendcrlconfig" pkisecretbackendcrlconfig.PkiSecretBackendCrlConfig_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1059,7 +1066,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendcrlconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendcrlconfig" &pkisecretbackendcrlconfig.PkiSecretBackendCrlConfigConfig { Connection: interface{}, diff --git a/docs/pkiSecretBackendCrlConfig.java.md b/docs/pkiSecretBackendCrlConfig.java.md index 9831c359..98aa2911 100644 --- a/docs/pkiSecretBackendCrlConfig.java.md +++ b/docs/pkiSecretBackendCrlConfig.java.md @@ -284,6 +284,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -368,6 +369,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/pkiSecretBackendCrlConfig.python.md b/docs/pkiSecretBackendCrlConfig.python.md index 36e3652e..b1402d20 100644 --- a/docs/pkiSecretBackendCrlConfig.python.md +++ b/docs/pkiSecretBackendCrlConfig.python.md @@ -275,6 +275,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -364,6 +365,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/pkiSecretBackendCrlConfig.typescript.md b/docs/pkiSecretBackendCrlConfig.typescript.md index 1ef3e580..d5f0710e 100644 --- a/docs/pkiSecretBackendCrlConfig.typescript.md +++ b/docs/pkiSecretBackendCrlConfig.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -138,6 +139,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/pkiSecretBackendIntermediateCertRequest.csharp.md b/docs/pkiSecretBackendIntermediateCertRequest.csharp.md index 0051086d..204530bc 100644 --- a/docs/pkiSecretBackendIntermediateCertRequest.csharp.md +++ b/docs/pkiSecretBackendIntermediateCertRequest.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -148,6 +149,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/pkiSecretBackendIntermediateCertRequest.go.md b/docs/pkiSecretBackendIntermediateCertRequest.go.md index 0186d476..ff6e8023 100644 --- a/docs/pkiSecretBackendIntermediateCertRequest.go.md +++ b/docs/pkiSecretBackendIntermediateCertRequest.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendintermediatecertrequest" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendintermediatecertrequest" pkisecretbackendintermediatecertrequest.NewPkiSecretBackendIntermediateCertRequest(scope Construct, id *string, config PkiSecretBackendIntermediateCertRequestConfig) PkiSecretBackendIntermediateCertRequest ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -148,6 +149,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -532,7 +539,7 @@ func ResetUriSans() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendintermediatecertrequest" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendintermediatecertrequest" pkisecretbackendintermediatecertrequest.PkiSecretBackendIntermediateCertRequest_IsConstruct(x interface{}) *bool ``` @@ -564,7 +571,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendintermediatecertrequest" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendintermediatecertrequest" pkisecretbackendintermediatecertrequest.PkiSecretBackendIntermediateCertRequest_IsTerraformElement(x interface{}) *bool ``` @@ -578,7 +585,7 @@ pkisecretbackendintermediatecertrequest.PkiSecretBackendIntermediateCertRequest_ ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendintermediatecertrequest" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendintermediatecertrequest" pkisecretbackendintermediatecertrequest.PkiSecretBackendIntermediateCertRequest_IsTerraformResource(x interface{}) *bool ``` @@ -592,7 +599,7 @@ pkisecretbackendintermediatecertrequest.PkiSecretBackendIntermediateCertRequest_ ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendintermediatecertrequest" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendintermediatecertrequest" pkisecretbackendintermediatecertrequest.PkiSecretBackendIntermediateCertRequest_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1437,7 +1444,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendintermediatecertrequest" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendintermediatecertrequest" &pkisecretbackendintermediatecertrequest.PkiSecretBackendIntermediateCertRequestConfig { Connection: interface{}, diff --git a/docs/pkiSecretBackendIntermediateCertRequest.java.md b/docs/pkiSecretBackendIntermediateCertRequest.java.md index c0d07d64..a43e9d73 100644 --- a/docs/pkiSecretBackendIntermediateCertRequest.java.md +++ b/docs/pkiSecretBackendIntermediateCertRequest.java.md @@ -426,6 +426,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -520,6 +521,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/pkiSecretBackendIntermediateCertRequest.python.md b/docs/pkiSecretBackendIntermediateCertRequest.python.md index 58c46f63..73f5c107 100644 --- a/docs/pkiSecretBackendIntermediateCertRequest.python.md +++ b/docs/pkiSecretBackendIntermediateCertRequest.python.md @@ -422,6 +422,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -521,6 +522,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/pkiSecretBackendIntermediateCertRequest.typescript.md b/docs/pkiSecretBackendIntermediateCertRequest.typescript.md index ac074bc9..a8818525 100644 --- a/docs/pkiSecretBackendIntermediateCertRequest.typescript.md +++ b/docs/pkiSecretBackendIntermediateCertRequest.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -148,6 +149,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/pkiSecretBackendIntermediateSetSigned.csharp.md b/docs/pkiSecretBackendIntermediateSetSigned.csharp.md index df0cad55..4305acf8 100644 --- a/docs/pkiSecretBackendIntermediateSetSigned.csharp.md +++ b/docs/pkiSecretBackendIntermediateSetSigned.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/pkiSecretBackendIntermediateSetSigned.go.md b/docs/pkiSecretBackendIntermediateSetSigned.go.md index 13179daa..0ec13682 100644 --- a/docs/pkiSecretBackendIntermediateSetSigned.go.md +++ b/docs/pkiSecretBackendIntermediateSetSigned.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendintermediatesetsigned" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendintermediatesetsigned" pkisecretbackendintermediatesetsigned.NewPkiSecretBackendIntermediateSetSigned(scope Construct, id *string, config PkiSecretBackendIntermediateSetSignedConfig) PkiSecretBackendIntermediateSetSigned ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -385,7 +392,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendintermediatesetsigned" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendintermediatesetsigned" pkisecretbackendintermediatesetsigned.PkiSecretBackendIntermediateSetSigned_IsConstruct(x interface{}) *bool ``` @@ -417,7 +424,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendintermediatesetsigned" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendintermediatesetsigned" pkisecretbackendintermediatesetsigned.PkiSecretBackendIntermediateSetSigned_IsTerraformElement(x interface{}) *bool ``` @@ -431,7 +438,7 @@ pkisecretbackendintermediatesetsigned.PkiSecretBackendIntermediateSetSigned_IsTe ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendintermediatesetsigned" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendintermediatesetsigned" pkisecretbackendintermediatesetsigned.PkiSecretBackendIntermediateSetSigned_IsTerraformResource(x interface{}) *bool ``` @@ -445,7 +452,7 @@ pkisecretbackendintermediatesetsigned.PkiSecretBackendIntermediateSetSigned_IsTe ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendintermediatesetsigned" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendintermediatesetsigned" pkisecretbackendintermediatesetsigned.PkiSecretBackendIntermediateSetSigned_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -784,7 +791,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendintermediatesetsigned" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendintermediatesetsigned" &pkisecretbackendintermediatesetsigned.PkiSecretBackendIntermediateSetSignedConfig { Connection: interface{}, diff --git a/docs/pkiSecretBackendIntermediateSetSigned.java.md b/docs/pkiSecretBackendIntermediateSetSigned.java.md index 145ed418..1ca6812e 100644 --- a/docs/pkiSecretBackendIntermediateSetSigned.java.md +++ b/docs/pkiSecretBackendIntermediateSetSigned.java.md @@ -157,6 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -230,6 +231,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/pkiSecretBackendIntermediateSetSigned.python.md b/docs/pkiSecretBackendIntermediateSetSigned.python.md index e9140066..3bff7280 100644 --- a/docs/pkiSecretBackendIntermediateSetSigned.python.md +++ b/docs/pkiSecretBackendIntermediateSetSigned.python.md @@ -155,6 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -233,6 +234,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/pkiSecretBackendIntermediateSetSigned.typescript.md b/docs/pkiSecretBackendIntermediateSetSigned.typescript.md index c937b57c..f484cb07 100644 --- a/docs/pkiSecretBackendIntermediateSetSigned.typescript.md +++ b/docs/pkiSecretBackendIntermediateSetSigned.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/pkiSecretBackendIssuer.csharp.md b/docs/pkiSecretBackendIssuer.csharp.md index 677f0401..0058b647 100644 --- a/docs/pkiSecretBackendIssuer.csharp.md +++ b/docs/pkiSecretBackendIssuer.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -136,6 +137,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/pkiSecretBackendIssuer.go.md b/docs/pkiSecretBackendIssuer.go.md index 1d8602cf..3532f63c 100644 --- a/docs/pkiSecretBackendIssuer.go.md +++ b/docs/pkiSecretBackendIssuer.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendissuer" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendissuer" pkisecretbackendissuer.NewPkiSecretBackendIssuer(scope Construct, id *string, config PkiSecretBackendIssuerConfig) PkiSecretBackendIssuer ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -136,6 +137,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -448,7 +455,7 @@ func ResetUsage() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendissuer" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendissuer" pkisecretbackendissuer.PkiSecretBackendIssuer_IsConstruct(x interface{}) *bool ``` @@ -480,7 +487,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendissuer" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendissuer" pkisecretbackendissuer.PkiSecretBackendIssuer_IsTerraformElement(x interface{}) *bool ``` @@ -494,7 +501,7 @@ pkisecretbackendissuer.PkiSecretBackendIssuer_IsTerraformElement(x interface{}) ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendissuer" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendissuer" pkisecretbackendissuer.PkiSecretBackendIssuer_IsTerraformResource(x interface{}) *bool ``` @@ -508,7 +515,7 @@ pkisecretbackendissuer.PkiSecretBackendIssuer_IsTerraformResource(x interface{}) ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendissuer" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendissuer" pkisecretbackendissuer.PkiSecretBackendIssuer_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1034,7 +1041,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendissuer" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendissuer" &pkisecretbackendissuer.PkiSecretBackendIssuerConfig { Connection: interface{}, diff --git a/docs/pkiSecretBackendIssuer.java.md b/docs/pkiSecretBackendIssuer.java.md index afcd1ad7..05b74b8c 100644 --- a/docs/pkiSecretBackendIssuer.java.md +++ b/docs/pkiSecretBackendIssuer.java.md @@ -266,6 +266,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -348,6 +349,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/pkiSecretBackendIssuer.python.md b/docs/pkiSecretBackendIssuer.python.md index ad4e7265..4c53aab9 100644 --- a/docs/pkiSecretBackendIssuer.python.md +++ b/docs/pkiSecretBackendIssuer.python.md @@ -263,6 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -350,6 +351,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/pkiSecretBackendIssuer.typescript.md b/docs/pkiSecretBackendIssuer.typescript.md index 30ccebfe..347469f5 100644 --- a/docs/pkiSecretBackendIssuer.typescript.md +++ b/docs/pkiSecretBackendIssuer.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -136,6 +137,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/pkiSecretBackendKey.csharp.md b/docs/pkiSecretBackendKey.csharp.md index aac600bc..37814da5 100644 --- a/docs/pkiSecretBackendKey.csharp.md +++ b/docs/pkiSecretBackendKey.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -132,6 +133,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/pkiSecretBackendKey.go.md b/docs/pkiSecretBackendKey.go.md index 554861b2..4442c3c9 100644 --- a/docs/pkiSecretBackendKey.go.md +++ b/docs/pkiSecretBackendKey.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendkey" pkisecretbackendkey.NewPkiSecretBackendKey(scope Construct, id *string, config PkiSecretBackendKeyConfig) PkiSecretBackendKey ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -132,6 +133,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -420,7 +427,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendkey" pkisecretbackendkey.PkiSecretBackendKey_IsConstruct(x interface{}) *bool ``` @@ -452,7 +459,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendkey" pkisecretbackendkey.PkiSecretBackendKey_IsTerraformElement(x interface{}) *bool ``` @@ -466,7 +473,7 @@ pkisecretbackendkey.PkiSecretBackendKey_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendkey" pkisecretbackendkey.PkiSecretBackendKey_IsTerraformResource(x interface{}) *bool ``` @@ -480,7 +487,7 @@ pkisecretbackendkey.PkiSecretBackendKey_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendkey" pkisecretbackendkey.PkiSecretBackendKey_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -918,7 +925,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendkey" &pkisecretbackendkey.PkiSecretBackendKeyConfig { Connection: interface{}, diff --git a/docs/pkiSecretBackendKey.java.md b/docs/pkiSecretBackendKey.java.md index 7445f677..116095bf 100644 --- a/docs/pkiSecretBackendKey.java.md +++ b/docs/pkiSecretBackendKey.java.md @@ -217,6 +217,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -295,6 +296,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/pkiSecretBackendKey.python.md b/docs/pkiSecretBackendKey.python.md index 14be6fd7..c80e65ea 100644 --- a/docs/pkiSecretBackendKey.python.md +++ b/docs/pkiSecretBackendKey.python.md @@ -215,6 +215,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -298,6 +299,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/pkiSecretBackendKey.typescript.md b/docs/pkiSecretBackendKey.typescript.md index ac298a81..b5f11f77 100644 --- a/docs/pkiSecretBackendKey.typescript.md +++ b/docs/pkiSecretBackendKey.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -132,6 +133,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/pkiSecretBackendRole.csharp.md b/docs/pkiSecretBackendRole.csharp.md index d3a9b2e8..fb103b24 100644 --- a/docs/pkiSecretBackendRole.csharp.md +++ b/docs/pkiSecretBackendRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -170,6 +171,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp @@ -2941,6 +2948,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -2948,6 +2956,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp diff --git a/docs/pkiSecretBackendRole.go.md b/docs/pkiSecretBackendRole.go.md index a16ae608..aeeec48a 100644 --- a/docs/pkiSecretBackendRole.go.md +++ b/docs/pkiSecretBackendRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrole" pkisecretbackendrole.NewPkiSecretBackendRole(scope Construct, id *string, config PkiSecretBackendRoleConfig) PkiSecretBackendRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -170,6 +171,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -692,7 +699,7 @@ func ResetUseCsrSans() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrole" pkisecretbackendrole.PkiSecretBackendRole_IsConstruct(x interface{}) *bool ``` @@ -724,7 +731,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrole" pkisecretbackendrole.PkiSecretBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -738,7 +745,7 @@ pkisecretbackendrole.PkiSecretBackendRole_IsTerraformElement(x interface{}) *boo ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrole" pkisecretbackendrole.PkiSecretBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -752,7 +759,7 @@ pkisecretbackendrole.PkiSecretBackendRole_IsTerraformResource(x interface{}) *bo ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrole" pkisecretbackendrole.PkiSecretBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1993,7 +2000,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrole" &pkisecretbackendrole.PkiSecretBackendRoleConfig { Connection: interface{}, @@ -2832,7 +2839,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrole" &pkisecretbackendrole.PkiSecretBackendRolePolicyIdentifier { Oid: *string, @@ -2900,7 +2907,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrole" pkisecretbackendrole.NewPkiSecretBackendRolePolicyIdentifierList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) PkiSecretBackendRolePolicyIdentifierList ``` @@ -2941,6 +2948,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -2948,6 +2956,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -3043,7 +3067,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrole" pkisecretbackendrole.NewPkiSecretBackendRolePolicyIdentifierOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) PkiSecretBackendRolePolicyIdentifierOutputReference ``` diff --git a/docs/pkiSecretBackendRole.java.md b/docs/pkiSecretBackendRole.java.md index 073cde82..42d369e6 100644 --- a/docs/pkiSecretBackendRole.java.md +++ b/docs/pkiSecretBackendRole.java.md @@ -682,6 +682,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -798,6 +799,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java @@ -3596,6 +3603,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -3603,6 +3611,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java diff --git a/docs/pkiSecretBackendRole.python.md b/docs/pkiSecretBackendRole.python.md index 99069257..503f67fc 100644 --- a/docs/pkiSecretBackendRole.python.md +++ b/docs/pkiSecretBackendRole.python.md @@ -659,6 +659,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -780,6 +781,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python @@ -3600,6 +3607,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -3607,6 +3615,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python diff --git a/docs/pkiSecretBackendRole.typescript.md b/docs/pkiSecretBackendRole.typescript.md index 7bd6ac0e..acd3fbef 100644 --- a/docs/pkiSecretBackendRole.typescript.md +++ b/docs/pkiSecretBackendRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -170,6 +171,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript @@ -2883,6 +2890,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -2890,6 +2898,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript diff --git a/docs/pkiSecretBackendRootCert.csharp.md b/docs/pkiSecretBackendRootCert.csharp.md index 17e04b8a..15002924 100644 --- a/docs/pkiSecretBackendRootCert.csharp.md +++ b/docs/pkiSecretBackendRootCert.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -151,6 +152,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/pkiSecretBackendRootCert.go.md b/docs/pkiSecretBackendRootCert.go.md index 656b121d..41fac54b 100644 --- a/docs/pkiSecretBackendRootCert.go.md +++ b/docs/pkiSecretBackendRootCert.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendrootcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrootcert" pkisecretbackendrootcert.NewPkiSecretBackendRootCert(scope Construct, id *string, config PkiSecretBackendRootCertConfig) PkiSecretBackendRootCert ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -151,6 +152,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -553,7 +560,7 @@ func ResetUriSans() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendrootcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrootcert" pkisecretbackendrootcert.PkiSecretBackendRootCert_IsConstruct(x interface{}) *bool ``` @@ -585,7 +592,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendrootcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrootcert" pkisecretbackendrootcert.PkiSecretBackendRootCert_IsTerraformElement(x interface{}) *bool ``` @@ -599,7 +606,7 @@ pkisecretbackendrootcert.PkiSecretBackendRootCert_IsTerraformElement(x interface ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendrootcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrootcert" pkisecretbackendrootcert.PkiSecretBackendRootCert_IsTerraformResource(x interface{}) *bool ``` @@ -613,7 +620,7 @@ pkisecretbackendrootcert.PkiSecretBackendRootCert_IsTerraformResource(x interfac ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendrootcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrootcert" pkisecretbackendrootcert.PkiSecretBackendRootCert_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1546,7 +1553,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendrootcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrootcert" &pkisecretbackendrootcert.PkiSecretBackendRootCertConfig { Connection: interface{}, diff --git a/docs/pkiSecretBackendRootCert.java.md b/docs/pkiSecretBackendRootCert.java.md index 33a5d5eb..2c48af71 100644 --- a/docs/pkiSecretBackendRootCert.java.md +++ b/docs/pkiSecretBackendRootCert.java.md @@ -460,6 +460,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -557,6 +558,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/pkiSecretBackendRootCert.python.md b/docs/pkiSecretBackendRootCert.python.md index 9ac4d2d2..573908e6 100644 --- a/docs/pkiSecretBackendRootCert.python.md +++ b/docs/pkiSecretBackendRootCert.python.md @@ -457,6 +457,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -559,6 +560,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/pkiSecretBackendRootCert.typescript.md b/docs/pkiSecretBackendRootCert.typescript.md index f7d869be..070437cd 100644 --- a/docs/pkiSecretBackendRootCert.typescript.md +++ b/docs/pkiSecretBackendRootCert.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -151,6 +152,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/pkiSecretBackendRootSignIntermediate.csharp.md b/docs/pkiSecretBackendRootSignIntermediate.csharp.md index a7a30789..6d38422c 100644 --- a/docs/pkiSecretBackendRootSignIntermediate.csharp.md +++ b/docs/pkiSecretBackendRootSignIntermediate.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -146,6 +147,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/pkiSecretBackendRootSignIntermediate.go.md b/docs/pkiSecretBackendRootSignIntermediate.go.md index 669e788d..6c1a2a37 100644 --- a/docs/pkiSecretBackendRootSignIntermediate.go.md +++ b/docs/pkiSecretBackendRootSignIntermediate.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendrootsignintermediate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrootsignintermediate" pkisecretbackendrootsignintermediate.NewPkiSecretBackendRootSignIntermediate(scope Construct, id *string, config PkiSecretBackendRootSignIntermediateConfig) PkiSecretBackendRootSignIntermediate ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -146,6 +147,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -518,7 +525,7 @@ func ResetUseCsrValues() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendrootsignintermediate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrootsignintermediate" pkisecretbackendrootsignintermediate.PkiSecretBackendRootSignIntermediate_IsConstruct(x interface{}) *bool ``` @@ -550,7 +557,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendrootsignintermediate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrootsignintermediate" pkisecretbackendrootsignintermediate.PkiSecretBackendRootSignIntermediate_IsTerraformElement(x interface{}) *bool ``` @@ -564,7 +571,7 @@ pkisecretbackendrootsignintermediate.PkiSecretBackendRootSignIntermediate_IsTerr ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendrootsignintermediate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrootsignintermediate" pkisecretbackendrootsignintermediate.PkiSecretBackendRootSignIntermediate_IsTerraformResource(x interface{}) *bool ``` @@ -578,7 +585,7 @@ pkisecretbackendrootsignintermediate.PkiSecretBackendRootSignIntermediate_IsTerr ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendrootsignintermediate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrootsignintermediate" pkisecretbackendrootsignintermediate.PkiSecretBackendRootSignIntermediate_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1401,7 +1408,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendrootsignintermediate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrootsignintermediate" &pkisecretbackendrootsignintermediate.PkiSecretBackendRootSignIntermediateConfig { Connection: interface{}, diff --git a/docs/pkiSecretBackendRootSignIntermediate.java.md b/docs/pkiSecretBackendRootSignIntermediate.java.md index 8636341c..572e86eb 100644 --- a/docs/pkiSecretBackendRootSignIntermediate.java.md +++ b/docs/pkiSecretBackendRootSignIntermediate.java.md @@ -400,6 +400,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -492,6 +493,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/pkiSecretBackendRootSignIntermediate.python.md b/docs/pkiSecretBackendRootSignIntermediate.python.md index c5b7ac23..1973e9c1 100644 --- a/docs/pkiSecretBackendRootSignIntermediate.python.md +++ b/docs/pkiSecretBackendRootSignIntermediate.python.md @@ -395,6 +395,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -492,6 +493,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/pkiSecretBackendRootSignIntermediate.typescript.md b/docs/pkiSecretBackendRootSignIntermediate.typescript.md index 114083a3..71c1cc40 100644 --- a/docs/pkiSecretBackendRootSignIntermediate.typescript.md +++ b/docs/pkiSecretBackendRootSignIntermediate.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -146,6 +147,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/pkiSecretBackendSign.csharp.md b/docs/pkiSecretBackendSign.csharp.md index ed929560..cc456b0a 100644 --- a/docs/pkiSecretBackendSign.csharp.md +++ b/docs/pkiSecretBackendSign.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -137,6 +138,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/pkiSecretBackendSign.go.md b/docs/pkiSecretBackendSign.go.md index 8c17cc80..e5fe1984 100644 --- a/docs/pkiSecretBackendSign.go.md +++ b/docs/pkiSecretBackendSign.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendsign" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendsign" pkisecretbackendsign.NewPkiSecretBackendSign(scope Construct, id *string, config PkiSecretBackendSignConfig) PkiSecretBackendSign ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -137,6 +138,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -455,7 +462,7 @@ func ResetUriSans() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendsign" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendsign" pkisecretbackendsign.PkiSecretBackendSign_IsConstruct(x interface{}) *bool ``` @@ -487,7 +494,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendsign" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendsign" pkisecretbackendsign.PkiSecretBackendSign_IsTerraformElement(x interface{}) *bool ``` @@ -501,7 +508,7 @@ pkisecretbackendsign.PkiSecretBackendSign_IsTerraformElement(x interface{}) *boo ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendsign" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendsign" pkisecretbackendsign.PkiSecretBackendSign_IsTerraformResource(x interface{}) *bool ``` @@ -515,7 +522,7 @@ pkisecretbackendsign.PkiSecretBackendSign_IsTerraformResource(x interface{}) *bo ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendsign" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendsign" pkisecretbackendsign.PkiSecretBackendSign_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1173,7 +1180,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/pkisecretbackendsign" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendsign" &pkisecretbackendsign.PkiSecretBackendSignConfig { Connection: interface{}, diff --git a/docs/pkiSecretBackendSign.java.md b/docs/pkiSecretBackendSign.java.md index 878a7646..2cc59534 100644 --- a/docs/pkiSecretBackendSign.java.md +++ b/docs/pkiSecretBackendSign.java.md @@ -303,6 +303,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -386,6 +387,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/pkiSecretBackendSign.python.md b/docs/pkiSecretBackendSign.python.md index f12015a9..b932f3bb 100644 --- a/docs/pkiSecretBackendSign.python.md +++ b/docs/pkiSecretBackendSign.python.md @@ -299,6 +299,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -387,6 +388,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/pkiSecretBackendSign.typescript.md b/docs/pkiSecretBackendSign.typescript.md index 8f49888d..76e0ab8d 100644 --- a/docs/pkiSecretBackendSign.typescript.md +++ b/docs/pkiSecretBackendSign.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -137,6 +138,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/policy.csharp.md b/docs/policy.csharp.md index e013c6ed..6a9216ad 100644 --- a/docs/policy.csharp.md +++ b/docs/policy.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/policy.go.md b/docs/policy.go.md index c5b698e1..3466a7f6 100644 --- a/docs/policy.go.md +++ b/docs/policy.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/policy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/policy" policy.NewPolicy(scope Construct, id *string, config PolicyConfig) Policy ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -385,7 +392,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/policy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/policy" policy.Policy_IsConstruct(x interface{}) *bool ``` @@ -417,7 +424,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/policy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/policy" policy.Policy_IsTerraformElement(x interface{}) *bool ``` @@ -431,7 +438,7 @@ policy.Policy_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/policy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/policy" policy.Policy_IsTerraformResource(x interface{}) *bool ``` @@ -445,7 +452,7 @@ policy.Policy_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/policy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/policy" policy.Policy_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -762,7 +769,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/policy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/policy" &policy.PolicyConfig { Connection: interface{}, diff --git a/docs/policy.java.md b/docs/policy.java.md index 5357a653..d8026bce 100644 --- a/docs/policy.java.md +++ b/docs/policy.java.md @@ -157,6 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -230,6 +231,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/policy.python.md b/docs/policy.python.md index bc060f8f..dc5189c0 100644 --- a/docs/policy.python.md +++ b/docs/policy.python.md @@ -155,6 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -233,6 +234,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/policy.typescript.md b/docs/policy.typescript.md index b00ef55a..a60c03f4 100644 --- a/docs/policy.typescript.md +++ b/docs/policy.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/provider.csharp.md b/docs/provider.csharp.md index 64074db1..3cfad871 100644 --- a/docs/provider.csharp.md +++ b/docs/provider.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | ResetAddAddressToEnv | *No description.* | @@ -139,6 +140,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/provider.go.md b/docs/provider.go.md index d18350a6..8fa2f728 100644 --- a/docs/provider.go.md +++ b/docs/provider.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" provider.NewVaultProvider(scope Construct, id *string, config VaultProviderConfig) VaultProvider ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | ResetAddAddressToEnv | *No description.* | @@ -139,6 +140,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -347,7 +354,7 @@ func ResetVaultVersionOverride() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" provider.VaultProvider_IsConstruct(x interface{}) *bool ``` @@ -379,7 +386,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" provider.VaultProvider_IsTerraformElement(x interface{}) *bool ``` @@ -393,7 +400,7 @@ provider.VaultProvider_IsTerraformElement(x interface{}) *bool ##### `IsTerraformProvider` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" provider.VaultProvider_IsTerraformProvider(x interface{}) *bool ``` @@ -407,7 +414,7 @@ provider.VaultProvider_IsTerraformProvider(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" provider.VaultProvider_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1252,7 +1259,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" &provider.VaultProviderAuthLogin { Path: *string, @@ -1344,7 +1351,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" &provider.VaultProviderAuthLoginAws { Role: *string, @@ -1618,7 +1625,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" &provider.VaultProviderAuthLoginAzure { ResourceGroupName: *string, @@ -1832,7 +1839,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" &provider.VaultProviderAuthLoginCert { CertFile: *string, @@ -1946,7 +1953,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" &provider.VaultProviderAuthLoginGcp { Role: *string, @@ -2076,7 +2083,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" &provider.VaultProviderAuthLoginJwt { Jwt: *string, @@ -2174,7 +2181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" &provider.VaultProviderAuthLoginKerberos { DisableFastNegotiation: interface{}, @@ -2368,7 +2375,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" &provider.VaultProviderAuthLoginOci { AuthType: *string, @@ -2466,7 +2473,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" &provider.VaultProviderAuthLoginOidc { Role: *string, @@ -2580,7 +2587,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" &provider.VaultProviderAuthLoginRadius { Password: *string, @@ -2678,7 +2685,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" &provider.VaultProviderAuthLoginTokenFile { Filename: *string, @@ -2744,7 +2751,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" &provider.VaultProviderAuthLoginUserpass { Username: *string, @@ -2858,7 +2865,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" &provider.VaultProviderClientAuth { CertFile: *string, @@ -2908,27 +2915,27 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" &provider.VaultProviderConfig { Address: *string, AddAddressToEnv: *string, Alias: *string, - AuthLogin: github.com/cdktf/cdktf-provider-vault-go/vault/v11.provider.VaultProviderAuthLogin, - AuthLoginAws: github.com/cdktf/cdktf-provider-vault-go/vault/v11.provider.VaultProviderAuthLoginAws, - AuthLoginAzure: github.com/cdktf/cdktf-provider-vault-go/vault/v11.provider.VaultProviderAuthLoginAzure, - AuthLoginCert: github.com/cdktf/cdktf-provider-vault-go/vault/v11.provider.VaultProviderAuthLoginCert, - AuthLoginGcp: github.com/cdktf/cdktf-provider-vault-go/vault/v11.provider.VaultProviderAuthLoginGcp, - AuthLoginJwt: github.com/cdktf/cdktf-provider-vault-go/vault/v11.provider.VaultProviderAuthLoginJwt, - AuthLoginKerberos: github.com/cdktf/cdktf-provider-vault-go/vault/v11.provider.VaultProviderAuthLoginKerberos, - AuthLoginOci: github.com/cdktf/cdktf-provider-vault-go/vault/v11.provider.VaultProviderAuthLoginOci, - AuthLoginOidc: github.com/cdktf/cdktf-provider-vault-go/vault/v11.provider.VaultProviderAuthLoginOidc, - AuthLoginRadius: github.com/cdktf/cdktf-provider-vault-go/vault/v11.provider.VaultProviderAuthLoginRadius, - AuthLoginTokenFile: github.com/cdktf/cdktf-provider-vault-go/vault/v11.provider.VaultProviderAuthLoginTokenFile, - AuthLoginUserpass: github.com/cdktf/cdktf-provider-vault-go/vault/v11.provider.VaultProviderAuthLoginUserpass, + AuthLogin: github.com/cdktf/cdktf-provider-vault-go/vault/v12.provider.VaultProviderAuthLogin, + AuthLoginAws: github.com/cdktf/cdktf-provider-vault-go/vault/v12.provider.VaultProviderAuthLoginAws, + AuthLoginAzure: github.com/cdktf/cdktf-provider-vault-go/vault/v12.provider.VaultProviderAuthLoginAzure, + AuthLoginCert: github.com/cdktf/cdktf-provider-vault-go/vault/v12.provider.VaultProviderAuthLoginCert, + AuthLoginGcp: github.com/cdktf/cdktf-provider-vault-go/vault/v12.provider.VaultProviderAuthLoginGcp, + AuthLoginJwt: github.com/cdktf/cdktf-provider-vault-go/vault/v12.provider.VaultProviderAuthLoginJwt, + AuthLoginKerberos: github.com/cdktf/cdktf-provider-vault-go/vault/v12.provider.VaultProviderAuthLoginKerberos, + AuthLoginOci: github.com/cdktf/cdktf-provider-vault-go/vault/v12.provider.VaultProviderAuthLoginOci, + AuthLoginOidc: github.com/cdktf/cdktf-provider-vault-go/vault/v12.provider.VaultProviderAuthLoginOidc, + AuthLoginRadius: github.com/cdktf/cdktf-provider-vault-go/vault/v12.provider.VaultProviderAuthLoginRadius, + AuthLoginTokenFile: github.com/cdktf/cdktf-provider-vault-go/vault/v12.provider.VaultProviderAuthLoginTokenFile, + AuthLoginUserpass: github.com/cdktf/cdktf-provider-vault-go/vault/v12.provider.VaultProviderAuthLoginUserpass, CaCertDir: *string, CaCertFile: *string, - ClientAuth: github.com/cdktf/cdktf-provider-vault-go/vault/v11.provider.VaultProviderClientAuth, + ClientAuth: github.com/cdktf/cdktf-provider-vault-go/vault/v12.provider.VaultProviderClientAuth, Headers: interface{}, MaxLeaseTtlSeconds: *f64, MaxRetries: *f64, @@ -3422,7 +3429,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" &provider.VaultProviderHeaders { Name: *string, diff --git a/docs/provider.java.md b/docs/provider.java.md index 85097a82..02062ffb 100644 --- a/docs/provider.java.md +++ b/docs/provider.java.md @@ -425,6 +425,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | resetAddAddressToEnv | *No description.* | @@ -510,6 +511,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/provider.python.md b/docs/provider.python.md index 20392fb8..10369be4 100644 --- a/docs/provider.python.md +++ b/docs/provider.python.md @@ -422,6 +422,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | reset_add_address_to_env | *No description.* | @@ -512,6 +513,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/provider.typescript.md b/docs/provider.typescript.md index c849f9aa..26f6af34 100644 --- a/docs/provider.typescript.md +++ b/docs/provider.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | resetAddAddressToEnv | *No description.* | @@ -139,6 +140,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/quotaLeaseCount.csharp.md b/docs/quotaLeaseCount.csharp.md index 5bdc1d5e..34912836 100644 --- a/docs/quotaLeaseCount.csharp.md +++ b/docs/quotaLeaseCount.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/quotaLeaseCount.go.md b/docs/quotaLeaseCount.go.md index 6a9e70ed..a95c1e5e 100644 --- a/docs/quotaLeaseCount.go.md +++ b/docs/quotaLeaseCount.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/quotaleasecount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/quotaleasecount" quotaleasecount.NewQuotaLeaseCount(scope Construct, id *string, config QuotaLeaseCountConfig) QuotaLeaseCount ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -399,7 +406,7 @@ func ResetRole() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/quotaleasecount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/quotaleasecount" quotaleasecount.QuotaLeaseCount_IsConstruct(x interface{}) *bool ``` @@ -431,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/quotaleasecount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/quotaleasecount" quotaleasecount.QuotaLeaseCount_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +452,7 @@ quotaleasecount.QuotaLeaseCount_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/quotaleasecount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/quotaleasecount" quotaleasecount.QuotaLeaseCount_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +466,7 @@ quotaleasecount.QuotaLeaseCount_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/quotaleasecount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/quotaleasecount" quotaleasecount.QuotaLeaseCount_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -820,7 +827,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/quotaleasecount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/quotaleasecount" "aleasecount.QuotaLeaseCountConfig { Connection: interface{}, diff --git a/docs/quotaLeaseCount.java.md b/docs/quotaLeaseCount.java.md index 2aa9fc7b..2819d608 100644 --- a/docs/quotaLeaseCount.java.md +++ b/docs/quotaLeaseCount.java.md @@ -181,6 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -256,6 +257,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/quotaLeaseCount.python.md b/docs/quotaLeaseCount.python.md index 33c9e413..915445ea 100644 --- a/docs/quotaLeaseCount.python.md +++ b/docs/quotaLeaseCount.python.md @@ -179,6 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -259,6 +260,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/quotaLeaseCount.typescript.md b/docs/quotaLeaseCount.typescript.md index d79f2654..5ce5ed44 100644 --- a/docs/quotaLeaseCount.typescript.md +++ b/docs/quotaLeaseCount.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -129,6 +130,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/quotaRateLimit.csharp.md b/docs/quotaRateLimit.csharp.md index 0bf86ae8..a65860e5 100644 --- a/docs/quotaRateLimit.csharp.md +++ b/docs/quotaRateLimit.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/quotaRateLimit.go.md b/docs/quotaRateLimit.go.md index 6a6bbc65..285a9676 100644 --- a/docs/quotaRateLimit.go.md +++ b/docs/quotaRateLimit.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/quotaratelimit" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/quotaratelimit" quotaratelimit.NewQuotaRateLimit(scope Construct, id *string, config QuotaRateLimitConfig) QuotaRateLimit ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -413,7 +420,7 @@ func ResetRole() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/quotaratelimit" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/quotaratelimit" quotaratelimit.QuotaRateLimit_IsConstruct(x interface{}) *bool ``` @@ -445,7 +452,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/quotaratelimit" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/quotaratelimit" quotaratelimit.QuotaRateLimit_IsTerraformElement(x interface{}) *bool ``` @@ -459,7 +466,7 @@ quotaratelimit.QuotaRateLimit_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/quotaratelimit" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/quotaratelimit" quotaratelimit.QuotaRateLimit_IsTerraformResource(x interface{}) *bool ``` @@ -473,7 +480,7 @@ quotaratelimit.QuotaRateLimit_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/quotaratelimit" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/quotaratelimit" quotaratelimit.QuotaRateLimit_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -878,7 +885,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/quotaratelimit" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/quotaratelimit" "aratelimit.QuotaRateLimitConfig { Connection: interface{}, diff --git a/docs/quotaRateLimit.java.md b/docs/quotaRateLimit.java.md index f93a72fe..f1019a93 100644 --- a/docs/quotaRateLimit.java.md +++ b/docs/quotaRateLimit.java.md @@ -207,6 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -284,6 +285,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/quotaRateLimit.python.md b/docs/quotaRateLimit.python.md index 88728c5f..1ffd9a3b 100644 --- a/docs/quotaRateLimit.python.md +++ b/docs/quotaRateLimit.python.md @@ -205,6 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -287,6 +288,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/quotaRateLimit.typescript.md b/docs/quotaRateLimit.typescript.md index 5c998df9..7a29fe20 100644 --- a/docs/quotaRateLimit.typescript.md +++ b/docs/quotaRateLimit.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/rabbitmqSecretBackend.csharp.md b/docs/rabbitmqSecretBackend.csharp.md index 5f0ff27e..c2c7b0b3 100644 --- a/docs/rabbitmqSecretBackend.csharp.md +++ b/docs/rabbitmqSecretBackend.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -135,6 +136,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/rabbitmqSecretBackend.go.md b/docs/rabbitmqSecretBackend.go.md index d3986c67..d0f88bfe 100644 --- a/docs/rabbitmqSecretBackend.go.md +++ b/docs/rabbitmqSecretBackend.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/rabbitmqsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackend" rabbitmqsecretbackend.NewRabbitmqSecretBackend(scope Construct, id *string, config RabbitmqSecretBackendConfig) RabbitmqSecretBackend ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -135,6 +136,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -441,7 +448,7 @@ func ResetVerifyConnection() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/rabbitmqsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackend" rabbitmqsecretbackend.RabbitmqSecretBackend_IsConstruct(x interface{}) *bool ``` @@ -473,7 +480,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/rabbitmqsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackend" rabbitmqsecretbackend.RabbitmqSecretBackend_IsTerraformElement(x interface{}) *bool ``` @@ -487,7 +494,7 @@ rabbitmqsecretbackend.RabbitmqSecretBackend_IsTerraformElement(x interface{}) *b ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/rabbitmqsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackend" rabbitmqsecretbackend.RabbitmqSecretBackend_IsTerraformResource(x interface{}) *bool ``` @@ -501,7 +508,7 @@ rabbitmqsecretbackend.RabbitmqSecretBackend_IsTerraformResource(x interface{}) * ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/rabbitmqsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackend" rabbitmqsecretbackend.RabbitmqSecretBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1016,7 +1023,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/rabbitmqsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackend" &rabbitmqsecretbackend.RabbitmqSecretBackendConfig { Connection: interface{}, diff --git a/docs/rabbitmqSecretBackend.java.md b/docs/rabbitmqSecretBackend.java.md index 8eb72a89..db8b2c37 100644 --- a/docs/rabbitmqSecretBackend.java.md +++ b/docs/rabbitmqSecretBackend.java.md @@ -267,6 +267,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -348,6 +349,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/rabbitmqSecretBackend.python.md b/docs/rabbitmqSecretBackend.python.md index efefb1bc..99684e4d 100644 --- a/docs/rabbitmqSecretBackend.python.md +++ b/docs/rabbitmqSecretBackend.python.md @@ -263,6 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -349,6 +350,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/rabbitmqSecretBackend.typescript.md b/docs/rabbitmqSecretBackend.typescript.md index 725d790d..e998f405 100644 --- a/docs/rabbitmqSecretBackend.typescript.md +++ b/docs/rabbitmqSecretBackend.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -135,6 +136,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/rabbitmqSecretBackendRole.csharp.md b/docs/rabbitmqSecretBackendRole.csharp.md index 0d75fe09..f338ce6b 100644 --- a/docs/rabbitmqSecretBackendRole.csharp.md +++ b/docs/rabbitmqSecretBackendRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -132,6 +133,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp @@ -1331,6 +1338,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1338,6 +1346,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp @@ -1829,6 +1853,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1836,6 +1861,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp @@ -2303,6 +2344,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -2310,6 +2352,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp diff --git a/docs/rabbitmqSecretBackendRole.go.md b/docs/rabbitmqSecretBackendRole.go.md index 253b1615..90aad033 100644 --- a/docs/rabbitmqSecretBackendRole.go.md +++ b/docs/rabbitmqSecretBackendRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" rabbitmqsecretbackendrole.NewRabbitmqSecretBackendRole(scope Construct, id *string, config RabbitmqSecretBackendRoleConfig) RabbitmqSecretBackendRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -132,6 +133,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -432,7 +439,7 @@ func ResetVhostTopic() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" rabbitmqsecretbackendrole.RabbitmqSecretBackendRole_IsConstruct(x interface{}) *bool ``` @@ -464,7 +471,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" rabbitmqsecretbackendrole.RabbitmqSecretBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -478,7 +485,7 @@ rabbitmqsecretbackendrole.RabbitmqSecretBackendRole_IsTerraformElement(x interfa ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" rabbitmqsecretbackendrole.RabbitmqSecretBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -492,7 +499,7 @@ rabbitmqsecretbackendrole.RabbitmqSecretBackendRole_IsTerraformResource(x interf ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" rabbitmqsecretbackendrole.RabbitmqSecretBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -875,7 +882,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" &rabbitmqsecretbackendrole.RabbitmqSecretBackendRoleConfig { Connection: interface{}, @@ -1090,7 +1097,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" &rabbitmqsecretbackendrole.RabbitmqSecretBackendRoleVhost { Configure: *string, @@ -1172,7 +1179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" &rabbitmqsecretbackendrole.RabbitmqSecretBackendRoleVhostTopic { Host: *string, @@ -1222,7 +1229,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" &rabbitmqsecretbackendrole.RabbitmqSecretBackendRoleVhostTopicVhost { Read: *string, @@ -1290,7 +1297,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" rabbitmqsecretbackendrole.NewRabbitmqSecretBackendRoleVhostList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) RabbitmqSecretBackendRoleVhostList ``` @@ -1331,6 +1338,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1338,6 +1346,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -1433,7 +1457,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" rabbitmqsecretbackendrole.NewRabbitmqSecretBackendRoleVhostOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) RabbitmqSecretBackendRoleVhostOutputReference ``` @@ -1788,7 +1812,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" rabbitmqsecretbackendrole.NewRabbitmqSecretBackendRoleVhostTopicList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) RabbitmqSecretBackendRoleVhostTopicList ``` @@ -1829,6 +1853,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -1836,6 +1861,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -1931,7 +1972,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" rabbitmqsecretbackendrole.NewRabbitmqSecretBackendRoleVhostTopicOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) RabbitmqSecretBackendRoleVhostTopicOutputReference ``` @@ -2262,7 +2303,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" rabbitmqsecretbackendrole.NewRabbitmqSecretBackendRoleVhostTopicVhostList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) RabbitmqSecretBackendRoleVhostTopicVhostList ``` @@ -2303,6 +2344,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -2310,6 +2352,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -2405,7 +2463,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" rabbitmqsecretbackendrole.NewRabbitmqSecretBackendRoleVhostTopicVhostOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) RabbitmqSecretBackendRoleVhostTopicVhostOutputReference ``` diff --git a/docs/rabbitmqSecretBackendRole.java.md b/docs/rabbitmqSecretBackendRole.java.md index ba242a75..322ff3df 100644 --- a/docs/rabbitmqSecretBackendRole.java.md +++ b/docs/rabbitmqSecretBackendRole.java.md @@ -195,6 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -273,6 +274,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java @@ -1481,6 +1488,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -1488,6 +1496,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java @@ -1979,6 +2003,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -1986,6 +2011,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java @@ -2453,6 +2494,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -2460,6 +2502,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java diff --git a/docs/rabbitmqSecretBackendRole.python.md b/docs/rabbitmqSecretBackendRole.python.md index 64c94dbe..2997f02c 100644 --- a/docs/rabbitmqSecretBackendRole.python.md +++ b/docs/rabbitmqSecretBackendRole.python.md @@ -191,6 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -274,6 +275,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python @@ -1524,6 +1531,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -1531,6 +1539,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python @@ -2057,6 +2083,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -2064,6 +2091,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python @@ -2568,6 +2613,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -2575,6 +2621,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python diff --git a/docs/rabbitmqSecretBackendRole.typescript.md b/docs/rabbitmqSecretBackendRole.typescript.md index 9e69691a..fa020d09 100644 --- a/docs/rabbitmqSecretBackendRole.typescript.md +++ b/docs/rabbitmqSecretBackendRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -132,6 +133,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript @@ -1304,6 +1311,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -1311,6 +1319,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript @@ -1802,6 +1826,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -1809,6 +1834,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript @@ -2276,6 +2317,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -2283,6 +2325,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript diff --git a/docs/raftAutopilot.csharp.md b/docs/raftAutopilot.csharp.md index 4ac7bc37..d23da286 100644 --- a/docs/raftAutopilot.csharp.md +++ b/docs/raftAutopilot.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -134,6 +135,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/raftAutopilot.go.md b/docs/raftAutopilot.go.md index 5135a353..296623fd 100644 --- a/docs/raftAutopilot.go.md +++ b/docs/raftAutopilot.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/raftautopilot" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/raftautopilot" raftautopilot.NewRaftAutopilot(scope Construct, id *string, config RaftAutopilotConfig) RaftAutopilot ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -134,6 +135,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -434,7 +441,7 @@ func ResetServerStabilizationTime() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/raftautopilot" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/raftautopilot" raftautopilot.RaftAutopilot_IsConstruct(x interface{}) *bool ``` @@ -466,7 +473,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/raftautopilot" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/raftautopilot" raftautopilot.RaftAutopilot_IsTerraformElement(x interface{}) *bool ``` @@ -480,7 +487,7 @@ raftautopilot.RaftAutopilot_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/raftautopilot" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/raftautopilot" raftautopilot.RaftAutopilot_IsTerraformResource(x interface{}) *bool ``` @@ -494,7 +501,7 @@ raftautopilot.RaftAutopilot_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/raftautopilot" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/raftautopilot" raftautopilot.RaftAutopilot_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -921,7 +928,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/raftautopilot" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/raftautopilot" &raftautopilot.RaftAutopilotConfig { Connection: interface{}, diff --git a/docs/raftAutopilot.java.md b/docs/raftAutopilot.java.md index 953d1f96..af4df177 100644 --- a/docs/raftAutopilot.java.md +++ b/docs/raftAutopilot.java.md @@ -225,6 +225,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -305,6 +306,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/raftAutopilot.python.md b/docs/raftAutopilot.python.md index 314f428b..02b1e4c6 100644 --- a/docs/raftAutopilot.python.md +++ b/docs/raftAutopilot.python.md @@ -221,6 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -306,6 +307,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/raftAutopilot.typescript.md b/docs/raftAutopilot.typescript.md index fec3384e..83c3f68f 100644 --- a/docs/raftAutopilot.typescript.md +++ b/docs/raftAutopilot.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -134,6 +135,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/raftSnapshotAgentConfig.csharp.md b/docs/raftSnapshotAgentConfig.csharp.md index eac9bc84..bb94cfa7 100644 --- a/docs/raftSnapshotAgentConfig.csharp.md +++ b/docs/raftSnapshotAgentConfig.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -150,6 +151,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/raftSnapshotAgentConfig.go.md b/docs/raftSnapshotAgentConfig.go.md index 6aab8627..ad460786 100644 --- a/docs/raftSnapshotAgentConfig.go.md +++ b/docs/raftSnapshotAgentConfig.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/raftsnapshotagentconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/raftsnapshotagentconfig" raftsnapshotagentconfig.NewRaftSnapshotAgentConfig(scope Construct, id *string, config RaftSnapshotAgentConfigConfig) RaftSnapshotAgentConfig ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -150,6 +151,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -546,7 +553,7 @@ func ResetRetain() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/raftsnapshotagentconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/raftsnapshotagentconfig" raftsnapshotagentconfig.RaftSnapshotAgentConfig_IsConstruct(x interface{}) *bool ``` @@ -578,7 +585,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/raftsnapshotagentconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/raftsnapshotagentconfig" raftsnapshotagentconfig.RaftSnapshotAgentConfig_IsTerraformElement(x interface{}) *bool ``` @@ -592,7 +599,7 @@ raftsnapshotagentconfig.RaftSnapshotAgentConfig_IsTerraformElement(x interface{} ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/raftsnapshotagentconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/raftsnapshotagentconfig" raftsnapshotagentconfig.RaftSnapshotAgentConfig_IsTerraformResource(x interface{}) *bool ``` @@ -606,7 +613,7 @@ raftsnapshotagentconfig.RaftSnapshotAgentConfig_IsTerraformResource(x interface{ ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/raftsnapshotagentconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/raftsnapshotagentconfig" raftsnapshotagentconfig.RaftSnapshotAgentConfig_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1473,7 +1480,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/raftsnapshotagentconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/raftsnapshotagentconfig" &raftsnapshotagentconfig.RaftSnapshotAgentConfigConfig { Connection: interface{}, diff --git a/docs/raftSnapshotAgentConfig.java.md b/docs/raftSnapshotAgentConfig.java.md index ec73be8d..3c40c31b 100644 --- a/docs/raftSnapshotAgentConfig.java.md +++ b/docs/raftSnapshotAgentConfig.java.md @@ -462,6 +462,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -558,6 +559,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/raftSnapshotAgentConfig.python.md b/docs/raftSnapshotAgentConfig.python.md index 53092adb..bb7785ec 100644 --- a/docs/raftSnapshotAgentConfig.python.md +++ b/docs/raftSnapshotAgentConfig.python.md @@ -455,6 +455,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -556,6 +557,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/raftSnapshotAgentConfig.typescript.md b/docs/raftSnapshotAgentConfig.typescript.md index 0db01b2e..615c7fc0 100644 --- a/docs/raftSnapshotAgentConfig.typescript.md +++ b/docs/raftSnapshotAgentConfig.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -150,6 +151,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/rgpPolicy.csharp.md b/docs/rgpPolicy.csharp.md index ecca27b9..8d383fe6 100644 --- a/docs/rgpPolicy.csharp.md +++ b/docs/rgpPolicy.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/rgpPolicy.go.md b/docs/rgpPolicy.go.md index c7cb43da..eb4295b1 100644 --- a/docs/rgpPolicy.go.md +++ b/docs/rgpPolicy.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/rgppolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rgppolicy" rgppolicy.NewRgpPolicy(scope Construct, id *string, config RgpPolicyConfig) RgpPolicy ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -385,7 +392,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/rgppolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rgppolicy" rgppolicy.RgpPolicy_IsConstruct(x interface{}) *bool ``` @@ -417,7 +424,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/rgppolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rgppolicy" rgppolicy.RgpPolicy_IsTerraformElement(x interface{}) *bool ``` @@ -431,7 +438,7 @@ rgppolicy.RgpPolicy_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/rgppolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rgppolicy" rgppolicy.RgpPolicy_IsTerraformResource(x interface{}) *bool ``` @@ -445,7 +452,7 @@ rgppolicy.RgpPolicy_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/rgppolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rgppolicy" rgppolicy.RgpPolicy_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -784,7 +791,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/rgppolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rgppolicy" &rgppolicy.RgpPolicyConfig { Connection: interface{}, diff --git a/docs/rgpPolicy.java.md b/docs/rgpPolicy.java.md index 129a6460..c9386cfd 100644 --- a/docs/rgpPolicy.java.md +++ b/docs/rgpPolicy.java.md @@ -169,6 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -242,6 +243,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/rgpPolicy.python.md b/docs/rgpPolicy.python.md index 6f44c9c4..fa29dd9e 100644 --- a/docs/rgpPolicy.python.md +++ b/docs/rgpPolicy.python.md @@ -167,6 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -245,6 +246,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/rgpPolicy.typescript.md b/docs/rgpPolicy.typescript.md index d90a6738..7ab99a29 100644 --- a/docs/rgpPolicy.typescript.md +++ b/docs/rgpPolicy.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/samlAuthBackend.csharp.md b/docs/samlAuthBackend.csharp.md index 4606bbf8..a244c26d 100644 --- a/docs/samlAuthBackend.csharp.md +++ b/docs/samlAuthBackend.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -135,6 +136,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/samlAuthBackend.go.md b/docs/samlAuthBackend.go.md index a2804cc7..a1ce4aa1 100644 --- a/docs/samlAuthBackend.go.md +++ b/docs/samlAuthBackend.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/samlauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/samlauthbackend" samlauthbackend.NewSamlAuthBackend(scope Construct, id *string, config SamlAuthBackendConfig) SamlAuthBackend ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -135,6 +136,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -441,7 +448,7 @@ func ResetVerboseLogging() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/samlauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/samlauthbackend" samlauthbackend.SamlAuthBackend_IsConstruct(x interface{}) *bool ``` @@ -473,7 +480,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/samlauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/samlauthbackend" samlauthbackend.SamlAuthBackend_IsTerraformElement(x interface{}) *bool ``` @@ -487,7 +494,7 @@ samlauthbackend.SamlAuthBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/samlauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/samlauthbackend" samlauthbackend.SamlAuthBackend_IsTerraformResource(x interface{}) *bool ``` @@ -501,7 +508,7 @@ samlauthbackend.SamlAuthBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/samlauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/samlauthbackend" samlauthbackend.SamlAuthBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -994,7 +1001,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/samlauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/samlauthbackend" &samlauthbackend.SamlAuthBackendConfig { Connection: interface{}, diff --git a/docs/samlAuthBackend.java.md b/docs/samlAuthBackend.java.md index 1625ac78..db896a8f 100644 --- a/docs/samlAuthBackend.java.md +++ b/docs/samlAuthBackend.java.md @@ -255,6 +255,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -336,6 +337,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/samlAuthBackend.python.md b/docs/samlAuthBackend.python.md index 387019e9..b3433f17 100644 --- a/docs/samlAuthBackend.python.md +++ b/docs/samlAuthBackend.python.md @@ -251,6 +251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -337,6 +338,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/samlAuthBackend.typescript.md b/docs/samlAuthBackend.typescript.md index e4efd880..8d15e8a7 100644 --- a/docs/samlAuthBackend.typescript.md +++ b/docs/samlAuthBackend.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -135,6 +136,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/samlAuthBackendRole.csharp.md b/docs/samlAuthBackendRole.csharp.md index 5c21adcb..eb35aea5 100644 --- a/docs/samlAuthBackendRole.csharp.md +++ b/docs/samlAuthBackendRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -141,6 +142,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/samlAuthBackendRole.go.md b/docs/samlAuthBackendRole.go.md index 1bd94154..1fab21f6 100644 --- a/docs/samlAuthBackendRole.go.md +++ b/docs/samlAuthBackendRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/samlauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/samlauthbackendrole" samlauthbackendrole.NewSamlAuthBackendRole(scope Construct, id *string, config SamlAuthBackendRoleConfig) SamlAuthBackendRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -141,6 +142,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -483,7 +490,7 @@ func ResetTokenType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/samlauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/samlauthbackendrole" samlauthbackendrole.SamlAuthBackendRole_IsConstruct(x interface{}) *bool ``` @@ -515,7 +522,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/samlauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/samlauthbackendrole" samlauthbackendrole.SamlAuthBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -529,7 +536,7 @@ samlauthbackendrole.SamlAuthBackendRole_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/samlauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/samlauthbackendrole" samlauthbackendrole.SamlAuthBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -543,7 +550,7 @@ samlauthbackendrole.SamlAuthBackendRole_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/samlauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/samlauthbackendrole" samlauthbackendrole.SamlAuthBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1168,7 +1175,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/samlauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/samlauthbackendrole" &samlauthbackendrole.SamlAuthBackendRoleConfig { Connection: interface{}, diff --git a/docs/samlAuthBackendRole.java.md b/docs/samlAuthBackendRole.java.md index d1f8bfa3..53dfe2e5 100644 --- a/docs/samlAuthBackendRole.java.md +++ b/docs/samlAuthBackendRole.java.md @@ -326,6 +326,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -413,6 +414,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/samlAuthBackendRole.python.md b/docs/samlAuthBackendRole.python.md index c8014648..a30266db 100644 --- a/docs/samlAuthBackendRole.python.md +++ b/docs/samlAuthBackendRole.python.md @@ -323,6 +323,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -415,6 +416,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/samlAuthBackendRole.typescript.md b/docs/samlAuthBackendRole.typescript.md index e06e0612..f335ea3a 100644 --- a/docs/samlAuthBackendRole.typescript.md +++ b/docs/samlAuthBackendRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -141,6 +142,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/sshSecretBackendCa.csharp.md b/docs/sshSecretBackendCa.csharp.md index af69a30a..9682713a 100644 --- a/docs/sshSecretBackendCa.csharp.md +++ b/docs/sshSecretBackendCa.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/sshSecretBackendCa.go.md b/docs/sshSecretBackendCa.go.md index a3c2abc8..1e67c58d 100644 --- a/docs/sshSecretBackendCa.go.md +++ b/docs/sshSecretBackendCa.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/sshsecretbackendca" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendca" sshsecretbackendca.NewSshSecretBackendCa(scope Construct, id *string, config SshSecretBackendCaConfig) SshSecretBackendCa ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -413,7 +420,7 @@ func ResetPublicKey() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/sshsecretbackendca" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendca" sshsecretbackendca.SshSecretBackendCa_IsConstruct(x interface{}) *bool ``` @@ -445,7 +452,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/sshsecretbackendca" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendca" sshsecretbackendca.SshSecretBackendCa_IsTerraformElement(x interface{}) *bool ``` @@ -459,7 +466,7 @@ sshsecretbackendca.SshSecretBackendCa_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/sshsecretbackendca" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendca" sshsecretbackendca.SshSecretBackendCa_IsTerraformResource(x interface{}) *bool ``` @@ -473,7 +480,7 @@ sshsecretbackendca.SshSecretBackendCa_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/sshsecretbackendca" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendca" sshsecretbackendca.SshSecretBackendCa_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -834,7 +841,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/sshsecretbackendca" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendca" &sshsecretbackendca.SshSecretBackendCaConfig { Connection: interface{}, diff --git a/docs/sshSecretBackendCa.java.md b/docs/sshSecretBackendCa.java.md index e1c409e0..61b34203 100644 --- a/docs/sshSecretBackendCa.java.md +++ b/docs/sshSecretBackendCa.java.md @@ -182,6 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -259,6 +260,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/sshSecretBackendCa.python.md b/docs/sshSecretBackendCa.python.md index 8e20c287..94ccc264 100644 --- a/docs/sshSecretBackendCa.python.md +++ b/docs/sshSecretBackendCa.python.md @@ -179,6 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -261,6 +262,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/sshSecretBackendCa.typescript.md b/docs/sshSecretBackendCa.typescript.md index 59255af4..8611f06d 100644 --- a/docs/sshSecretBackendCa.typescript.md +++ b/docs/sshSecretBackendCa.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -131,6 +132,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/sshSecretBackendRole.csharp.md b/docs/sshSecretBackendRole.csharp.md index 6c9898be..cea9fd31 100644 --- a/docs/sshSecretBackendRole.csharp.md +++ b/docs/sshSecretBackendRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -151,6 +152,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp @@ -2062,6 +2069,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -2069,6 +2077,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```csharp +private DynamicListTerraformIterator AllWithMapKey(string MapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `MapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `ComputeFqn` ```csharp diff --git a/docs/sshSecretBackendRole.go.md b/docs/sshSecretBackendRole.go.md index 85a5439b..c4511195 100644 --- a/docs/sshSecretBackendRole.go.md +++ b/docs/sshSecretBackendRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/sshsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendrole" sshsecretbackendrole.NewSshSecretBackendRole(scope Construct, id *string, config SshSecretBackendRoleConfig) SshSecretBackendRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -151,6 +152,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -559,7 +566,7 @@ func ResetTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/sshsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendrole" sshsecretbackendrole.SshSecretBackendRole_IsConstruct(x interface{}) *bool ``` @@ -591,7 +598,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/sshsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendrole" sshsecretbackendrole.SshSecretBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -605,7 +612,7 @@ sshsecretbackendrole.SshSecretBackendRole_IsTerraformElement(x interface{}) *boo ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/sshsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendrole" sshsecretbackendrole.SshSecretBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -619,7 +626,7 @@ sshsecretbackendrole.SshSecretBackendRole_IsTerraformResource(x interface{}) *bo ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/sshsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendrole" sshsecretbackendrole.SshSecretBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1464,7 +1471,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/sshsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendrole" &sshsecretbackendrole.SshSecretBackendRoleAllowedUserKeyConfig { Lengths: *[]*f64, @@ -1514,7 +1521,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/sshsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendrole" &sshsecretbackendrole.SshSecretBackendRoleConfig { Connection: interface{}, @@ -2021,7 +2028,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/sshsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendrole" sshsecretbackendrole.NewSshSecretBackendRoleAllowedUserKeyConfigList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) SshSecretBackendRoleAllowedUserKeyConfigList ``` @@ -2062,6 +2069,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| AllWithMapKey | Creating an iterator for this complex list. | | ComputeFqn | *No description.* | | Resolve | Produce the Token's value at resolution time. | | ToString | Return a string representation of this resolvable object. | @@ -2069,6 +2077,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `AllWithMapKey` + +```go +func AllWithMapKey(mapKeyAttributeName *string) DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* *string + +--- + ##### `ComputeFqn` ```go @@ -2164,7 +2188,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/sshsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendrole" sshsecretbackendrole.NewSshSecretBackendRoleAllowedUserKeyConfigOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) SshSecretBackendRoleAllowedUserKeyConfigOutputReference ``` diff --git a/docs/sshSecretBackendRole.java.md b/docs/sshSecretBackendRole.java.md index 52d37bc2..e6d41621 100644 --- a/docs/sshSecretBackendRole.java.md +++ b/docs/sshSecretBackendRole.java.md @@ -408,6 +408,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -505,6 +506,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java @@ -2431,6 +2438,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -2438,6 +2446,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```java +public DynamicListTerraformIterator allWithMapKey(java.lang.String mapKeyAttributeName) +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* java.lang.String + +--- + ##### `computeFqn` ```java diff --git a/docs/sshSecretBackendRole.python.md b/docs/sshSecretBackendRole.python.md index e9b98f30..590e8c4c 100644 --- a/docs/sshSecretBackendRole.python.md +++ b/docs/sshSecretBackendRole.python.md @@ -397,6 +397,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -499,6 +500,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python @@ -2459,6 +2466,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| all_with_map_key | Creating an iterator for this complex list. | | compute_fqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | to_string | Return a string representation of this resolvable object. | @@ -2466,6 +2474,24 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `all_with_map_key` + +```python +def all_with_map_key( + map_key_attribute_name: str +) -> DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `map_key_attribute_name`Required + +- *Type:* str + +--- + ##### `compute_fqn` ```python diff --git a/docs/sshSecretBackendRole.typescript.md b/docs/sshSecretBackendRole.typescript.md index 3a964a54..bb476285 100644 --- a/docs/sshSecretBackendRole.typescript.md +++ b/docs/sshSecretBackendRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -151,6 +152,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript @@ -2023,6 +2030,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | **Name** | **Description** | | --- | --- | +| allWithMapKey | Creating an iterator for this complex list. | | computeFqn | *No description.* | | resolve | Produce the Token's value at resolution time. | | toString | Return a string representation of this resolvable object. | @@ -2030,6 +2038,22 @@ whether the list is wrapping a set (will add tolist() to be able to access an it --- +##### `allWithMapKey` + +```typescript +public allWithMapKey(mapKeyAttributeName: string): DynamicListTerraformIterator +``` + +Creating an iterator for this complex list. + +The list will be converted into a map with the mapKeyAttributeName as the key. + +###### `mapKeyAttributeName`Required + +- *Type:* string + +--- + ##### `computeFqn` ```typescript diff --git a/docs/terraformCloudSecretBackend.csharp.md b/docs/terraformCloudSecretBackend.csharp.md index 9b6d5b1d..9ee33a9f 100644 --- a/docs/terraformCloudSecretBackend.csharp.md +++ b/docs/terraformCloudSecretBackend.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -135,6 +136,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/terraformCloudSecretBackend.go.md b/docs/terraformCloudSecretBackend.go.md index 8eb8cb57..404803ce 100644 --- a/docs/terraformCloudSecretBackend.go.md +++ b/docs/terraformCloudSecretBackend.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/terraformcloudsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretbackend" terraformcloudsecretbackend.NewTerraformCloudSecretBackend(scope Construct, id *string, config TerraformCloudSecretBackendConfig) TerraformCloudSecretBackend ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -135,6 +136,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -441,7 +448,7 @@ func ResetToken() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/terraformcloudsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretbackend" terraformcloudsecretbackend.TerraformCloudSecretBackend_IsConstruct(x interface{}) *bool ``` @@ -473,7 +480,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/terraformcloudsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretbackend" terraformcloudsecretbackend.TerraformCloudSecretBackend_IsTerraformElement(x interface{}) *bool ``` @@ -487,7 +494,7 @@ terraformcloudsecretbackend.TerraformCloudSecretBackend_IsTerraformElement(x int ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/terraformcloudsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretbackend" terraformcloudsecretbackend.TerraformCloudSecretBackend_IsTerraformResource(x interface{}) *bool ``` @@ -501,7 +508,7 @@ terraformcloudsecretbackend.TerraformCloudSecretBackend_IsTerraformResource(x in ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/terraformcloudsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretbackend" terraformcloudsecretbackend.TerraformCloudSecretBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -950,7 +957,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/terraformcloudsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretbackend" &terraformcloudsecretbackend.TerraformCloudSecretBackendConfig { Connection: interface{}, diff --git a/docs/terraformCloudSecretBackend.java.md b/docs/terraformCloudSecretBackend.java.md index 163609f7..7b21a995 100644 --- a/docs/terraformCloudSecretBackend.java.md +++ b/docs/terraformCloudSecretBackend.java.md @@ -230,6 +230,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -311,6 +312,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/terraformCloudSecretBackend.python.md b/docs/terraformCloudSecretBackend.python.md index 7c4aaf97..34b7e454 100644 --- a/docs/terraformCloudSecretBackend.python.md +++ b/docs/terraformCloudSecretBackend.python.md @@ -227,6 +227,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -313,6 +314,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/terraformCloudSecretBackend.typescript.md b/docs/terraformCloudSecretBackend.typescript.md index 3d974fe0..1e16438f 100644 --- a/docs/terraformCloudSecretBackend.typescript.md +++ b/docs/terraformCloudSecretBackend.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -135,6 +136,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/terraformCloudSecretCreds.csharp.md b/docs/terraformCloudSecretCreds.csharp.md index 3d3e645e..646aefc5 100644 --- a/docs/terraformCloudSecretCreds.csharp.md +++ b/docs/terraformCloudSecretCreds.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/terraformCloudSecretCreds.go.md b/docs/terraformCloudSecretCreds.go.md index 30e4d00b..cc6840b5 100644 --- a/docs/terraformCloudSecretCreds.go.md +++ b/docs/terraformCloudSecretCreds.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/terraformcloudsecretcreds" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretcreds" terraformcloudsecretcreds.NewTerraformCloudSecretCreds(scope Construct, id *string, config TerraformCloudSecretCredsConfig) TerraformCloudSecretCreds ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -385,7 +392,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/terraformcloudsecretcreds" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretcreds" terraformcloudsecretcreds.TerraformCloudSecretCreds_IsConstruct(x interface{}) *bool ``` @@ -417,7 +424,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/terraformcloudsecretcreds" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretcreds" terraformcloudsecretcreds.TerraformCloudSecretCreds_IsTerraformElement(x interface{}) *bool ``` @@ -431,7 +438,7 @@ terraformcloudsecretcreds.TerraformCloudSecretCreds_IsTerraformElement(x interfa ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/terraformcloudsecretcreds" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretcreds" terraformcloudsecretcreds.TerraformCloudSecretCreds_IsTerraformResource(x interface{}) *bool ``` @@ -445,7 +452,7 @@ terraformcloudsecretcreds.TerraformCloudSecretCreds_IsTerraformResource(x interf ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/terraformcloudsecretcreds" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretcreds" terraformcloudsecretcreds.TerraformCloudSecretCreds_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -817,7 +824,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/terraformcloudsecretcreds" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretcreds" &terraformcloudsecretcreds.TerraformCloudSecretCredsConfig { Connection: interface{}, diff --git a/docs/terraformCloudSecretCreds.java.md b/docs/terraformCloudSecretCreds.java.md index e5a703b4..6e1ec753 100644 --- a/docs/terraformCloudSecretCreds.java.md +++ b/docs/terraformCloudSecretCreds.java.md @@ -157,6 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -230,6 +231,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/terraformCloudSecretCreds.python.md b/docs/terraformCloudSecretCreds.python.md index 20bd69ec..07c9d11b 100644 --- a/docs/terraformCloudSecretCreds.python.md +++ b/docs/terraformCloudSecretCreds.python.md @@ -155,6 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -233,6 +234,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/terraformCloudSecretCreds.typescript.md b/docs/terraformCloudSecretCreds.typescript.md index a91c3c91..96830ee8 100644 --- a/docs/terraformCloudSecretCreds.typescript.md +++ b/docs/terraformCloudSecretCreds.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/terraformCloudSecretRole.csharp.md b/docs/terraformCloudSecretRole.csharp.md index 10c791e3..8e567bb2 100644 --- a/docs/terraformCloudSecretRole.csharp.md +++ b/docs/terraformCloudSecretRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -133,6 +134,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/terraformCloudSecretRole.go.md b/docs/terraformCloudSecretRole.go.md index 7d3e8b51..ad69d3a5 100644 --- a/docs/terraformCloudSecretRole.go.md +++ b/docs/terraformCloudSecretRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/terraformcloudsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretrole" terraformcloudsecretrole.NewTerraformCloudSecretRole(scope Construct, id *string, config TerraformCloudSecretRoleConfig) TerraformCloudSecretRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -133,6 +134,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -427,7 +434,7 @@ func ResetUserId() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/terraformcloudsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretrole" terraformcloudsecretrole.TerraformCloudSecretRole_IsConstruct(x interface{}) *bool ``` @@ -459,7 +466,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/terraformcloudsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretrole" terraformcloudsecretrole.TerraformCloudSecretRole_IsTerraformElement(x interface{}) *bool ``` @@ -473,7 +480,7 @@ terraformcloudsecretrole.TerraformCloudSecretRole_IsTerraformElement(x interface ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/terraformcloudsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretrole" terraformcloudsecretrole.TerraformCloudSecretRole_IsTerraformResource(x interface{}) *bool ``` @@ -487,7 +494,7 @@ terraformcloudsecretrole.TerraformCloudSecretRole_IsTerraformResource(x interfac ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/terraformcloudsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretrole" terraformcloudsecretrole.TerraformCloudSecretRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -914,7 +921,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/terraformcloudsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretrole" &terraformcloudsecretrole.TerraformCloudSecretRoleConfig { Connection: interface{}, diff --git a/docs/terraformCloudSecretRole.java.md b/docs/terraformCloudSecretRole.java.md index f5b5bfc8..9be851b8 100644 --- a/docs/terraformCloudSecretRole.java.md +++ b/docs/terraformCloudSecretRole.java.md @@ -217,6 +217,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -296,6 +297,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/terraformCloudSecretRole.python.md b/docs/terraformCloudSecretRole.python.md index 175ba755..b9376c1f 100644 --- a/docs/terraformCloudSecretRole.python.md +++ b/docs/terraformCloudSecretRole.python.md @@ -215,6 +215,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -299,6 +300,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/terraformCloudSecretRole.typescript.md b/docs/terraformCloudSecretRole.typescript.md index b46f88ee..6e9c1e08 100644 --- a/docs/terraformCloudSecretRole.typescript.md +++ b/docs/terraformCloudSecretRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -133,6 +134,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/token.csharp.md b/docs/token.csharp.md index b6859066..fe15e226 100644 --- a/docs/token.csharp.md +++ b/docs/token.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -141,6 +142,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/token.go.md b/docs/token.go.md index 33522ed8..1bbb34a7 100644 --- a/docs/token.go.md +++ b/docs/token.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/token" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/token" token.NewToken(scope Construct, id *string, config TokenConfig) Token ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -141,6 +142,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -483,7 +490,7 @@ func ResetWrappingTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/token" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/token" token.Token_IsConstruct(x interface{}) *bool ``` @@ -515,7 +522,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/token" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/token" token.Token_IsTerraformElement(x interface{}) *bool ``` @@ -529,7 +536,7 @@ token.Token_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/token" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/token" token.Token_IsTerraformResource(x interface{}) *bool ``` @@ -543,7 +550,7 @@ token.Token_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/token" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/token" token.Token_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1179,7 +1186,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/token" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/token" &token.TokenConfig { Connection: interface{}, diff --git a/docs/token.java.md b/docs/token.java.md index d68e762b..8cad4eac 100644 --- a/docs/token.java.md +++ b/docs/token.java.md @@ -304,6 +304,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -391,6 +392,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/token.python.md b/docs/token.python.md index 333eead2..6f698811 100644 --- a/docs/token.python.md +++ b/docs/token.python.md @@ -299,6 +299,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -391,6 +392,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/token.typescript.md b/docs/token.typescript.md index 2beaeaa7..4fb781f2 100644 --- a/docs/token.typescript.md +++ b/docs/token.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -141,6 +142,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/tokenAuthBackendRole.csharp.md b/docs/tokenAuthBackendRole.csharp.md index d56a00d8..78cd9da0 100644 --- a/docs/tokenAuthBackendRole.csharp.md +++ b/docs/tokenAuthBackendRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -144,6 +145,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/tokenAuthBackendRole.go.md b/docs/tokenAuthBackendRole.go.md index e8c4fdad..5857dd4c 100644 --- a/docs/tokenAuthBackendRole.go.md +++ b/docs/tokenAuthBackendRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/tokenauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/tokenauthbackendrole" tokenauthbackendrole.NewTokenAuthBackendRole(scope Construct, id *string, config TokenAuthBackendRoleConfig) TokenAuthBackendRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -144,6 +145,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -504,7 +511,7 @@ func ResetTokenType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/tokenauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/tokenauthbackendrole" tokenauthbackendrole.TokenAuthBackendRole_IsConstruct(x interface{}) *bool ``` @@ -536,7 +543,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/tokenauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/tokenauthbackendrole" tokenauthbackendrole.TokenAuthBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -550,7 +557,7 @@ tokenauthbackendrole.TokenAuthBackendRole_IsTerraformElement(x interface{}) *boo ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/tokenauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/tokenauthbackendrole" tokenauthbackendrole.TokenAuthBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -564,7 +571,7 @@ tokenauthbackendrole.TokenAuthBackendRole_IsTerraformResource(x interface{}) *bo ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/tokenauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/tokenauthbackendrole" tokenauthbackendrole.TokenAuthBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1233,7 +1240,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/tokenauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/tokenauthbackendrole" &tokenauthbackendrole.TokenAuthBackendRoleConfig { Connection: interface{}, diff --git a/docs/tokenAuthBackendRole.java.md b/docs/tokenAuthBackendRole.java.md index 8b3de84c..12f2b6cc 100644 --- a/docs/tokenAuthBackendRole.java.md +++ b/docs/tokenAuthBackendRole.java.md @@ -352,6 +352,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -442,6 +443,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/tokenAuthBackendRole.python.md b/docs/tokenAuthBackendRole.python.md index 1a2fb87c..b98b835f 100644 --- a/docs/tokenAuthBackendRole.python.md +++ b/docs/tokenAuthBackendRole.python.md @@ -347,6 +347,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -442,6 +443,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/tokenAuthBackendRole.typescript.md b/docs/tokenAuthBackendRole.typescript.md index 95cb20f0..75d3db24 100644 --- a/docs/tokenAuthBackendRole.typescript.md +++ b/docs/tokenAuthBackendRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -144,6 +145,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/transformAlphabet.csharp.md b/docs/transformAlphabet.csharp.md index e779d839..0dac6b76 100644 --- a/docs/transformAlphabet.csharp.md +++ b/docs/transformAlphabet.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/transformAlphabet.go.md b/docs/transformAlphabet.go.md index 09b1d82e..6e3d70fe 100644 --- a/docs/transformAlphabet.go.md +++ b/docs/transformAlphabet.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transformalphabet" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformalphabet" transformalphabet.NewTransformAlphabet(scope Construct, id *string, config TransformAlphabetConfig) TransformAlphabet ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -392,7 +399,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transformalphabet" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformalphabet" transformalphabet.TransformAlphabet_IsConstruct(x interface{}) *bool ``` @@ -424,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transformalphabet" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformalphabet" transformalphabet.TransformAlphabet_IsTerraformElement(x interface{}) *bool ``` @@ -438,7 +445,7 @@ transformalphabet.TransformAlphabet_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transformalphabet" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformalphabet" transformalphabet.TransformAlphabet_IsTerraformResource(x interface{}) *bool ``` @@ -452,7 +459,7 @@ transformalphabet.TransformAlphabet_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transformalphabet" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformalphabet" transformalphabet.TransformAlphabet_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -791,7 +798,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transformalphabet" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformalphabet" &transformalphabet.TransformAlphabetConfig { Connection: interface{}, diff --git a/docs/transformAlphabet.java.md b/docs/transformAlphabet.java.md index 12666276..3646347c 100644 --- a/docs/transformAlphabet.java.md +++ b/docs/transformAlphabet.java.md @@ -169,6 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -243,6 +244,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/transformAlphabet.python.md b/docs/transformAlphabet.python.md index 099d2e87..1b7179ac 100644 --- a/docs/transformAlphabet.python.md +++ b/docs/transformAlphabet.python.md @@ -167,6 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -246,6 +247,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/transformAlphabet.typescript.md b/docs/transformAlphabet.typescript.md index ed335742..494cda8c 100644 --- a/docs/transformAlphabet.typescript.md +++ b/docs/transformAlphabet.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/transformRole.csharp.md b/docs/transformRole.csharp.md index 1ac4e0a2..43c3354b 100644 --- a/docs/transformRole.csharp.md +++ b/docs/transformRole.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/transformRole.go.md b/docs/transformRole.go.md index 305fc7a5..7d0f4be7 100644 --- a/docs/transformRole.go.md +++ b/docs/transformRole.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transformrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformrole" transformrole.NewTransformRole(scope Construct, id *string, config TransformRoleConfig) TransformRole ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -392,7 +399,7 @@ func ResetTransformations() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transformrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformrole" transformrole.TransformRole_IsConstruct(x interface{}) *bool ``` @@ -424,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transformrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformrole" transformrole.TransformRole_IsTerraformElement(x interface{}) *bool ``` @@ -438,7 +445,7 @@ transformrole.TransformRole_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transformrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformrole" transformrole.TransformRole_IsTerraformResource(x interface{}) *bool ``` @@ -452,7 +459,7 @@ transformrole.TransformRole_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transformrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformrole" transformrole.TransformRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -791,7 +798,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transformrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformrole" &transformrole.TransformRoleConfig { Connection: interface{}, diff --git a/docs/transformRole.java.md b/docs/transformRole.java.md index 481670f3..32d10eb4 100644 --- a/docs/transformRole.java.md +++ b/docs/transformRole.java.md @@ -169,6 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -243,6 +244,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/transformRole.python.md b/docs/transformRole.python.md index e10cf0e4..666edfe5 100644 --- a/docs/transformRole.python.md +++ b/docs/transformRole.python.md @@ -167,6 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -246,6 +247,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/transformRole.typescript.md b/docs/transformRole.typescript.md index 35f28665..f13cb869 100644 --- a/docs/transformRole.typescript.md +++ b/docs/transformRole.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -128,6 +129,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/transformTemplate.csharp.md b/docs/transformTemplate.csharp.md index 7c1b4a3c..f081c069 100644 --- a/docs/transformTemplate.csharp.md +++ b/docs/transformTemplate.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -132,6 +133,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/transformTemplate.go.md b/docs/transformTemplate.go.md index f0250749..aa8c55e6 100644 --- a/docs/transformTemplate.go.md +++ b/docs/transformTemplate.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transformtemplate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformtemplate" transformtemplate.NewTransformTemplate(scope Construct, id *string, config TransformTemplateConfig) TransformTemplate ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -132,6 +133,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -420,7 +427,7 @@ func ResetType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transformtemplate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformtemplate" transformtemplate.TransformTemplate_IsConstruct(x interface{}) *bool ``` @@ -452,7 +459,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transformtemplate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformtemplate" transformtemplate.TransformTemplate_IsTerraformElement(x interface{}) *bool ``` @@ -466,7 +473,7 @@ transformtemplate.TransformTemplate_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transformtemplate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformtemplate" transformtemplate.TransformTemplate_IsTerraformResource(x interface{}) *bool ``` @@ -480,7 +487,7 @@ transformtemplate.TransformTemplate_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transformtemplate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformtemplate" transformtemplate.TransformTemplate_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -907,7 +914,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transformtemplate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformtemplate" &transformtemplate.TransformTemplateConfig { Connection: interface{}, diff --git a/docs/transformTemplate.java.md b/docs/transformTemplate.java.md index 6dd7c4e2..8fd31908 100644 --- a/docs/transformTemplate.java.md +++ b/docs/transformTemplate.java.md @@ -217,6 +217,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -295,6 +296,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/transformTemplate.python.md b/docs/transformTemplate.python.md index e9f4cebd..b43b8ccd 100644 --- a/docs/transformTemplate.python.md +++ b/docs/transformTemplate.python.md @@ -215,6 +215,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -298,6 +299,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/transformTemplate.typescript.md b/docs/transformTemplate.typescript.md index 22982ef7..1fe482ab 100644 --- a/docs/transformTemplate.typescript.md +++ b/docs/transformTemplate.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -132,6 +133,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/transformTransformation.csharp.md b/docs/transformTransformation.csharp.md index 9ab92686..c6c37512 100644 --- a/docs/transformTransformation.csharp.md +++ b/docs/transformTransformation.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -134,6 +135,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/transformTransformation.go.md b/docs/transformTransformation.go.md index 7cd8d499..3f79a637 100644 --- a/docs/transformTransformation.go.md +++ b/docs/transformTransformation.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transformtransformation" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformtransformation" transformtransformation.NewTransformTransformation(scope Construct, id *string, config TransformTransformationConfig) TransformTransformation ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -134,6 +135,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -434,7 +441,7 @@ func ResetType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transformtransformation" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformtransformation" transformtransformation.TransformTransformation_IsConstruct(x interface{}) *bool ``` @@ -466,7 +473,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transformtransformation" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformtransformation" transformtransformation.TransformTransformation_IsTerraformElement(x interface{}) *bool ``` @@ -480,7 +487,7 @@ transformtransformation.TransformTransformation_IsTerraformElement(x interface{} ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transformtransformation" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformtransformation" transformtransformation.TransformTransformation_IsTerraformResource(x interface{}) *bool ``` @@ -494,7 +501,7 @@ transformtransformation.TransformTransformation_IsTerraformResource(x interface{ ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transformtransformation" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformtransformation" transformtransformation.TransformTransformation_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -965,7 +972,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transformtransformation" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformtransformation" &transformtransformation.TransformTransformationConfig { Connection: interface{}, diff --git a/docs/transformTransformation.java.md b/docs/transformTransformation.java.md index f97be8d0..e1c35dbf 100644 --- a/docs/transformTransformation.java.md +++ b/docs/transformTransformation.java.md @@ -242,6 +242,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -322,6 +323,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/transformTransformation.python.md b/docs/transformTransformation.python.md index 6b4b35e8..73c3081f 100644 --- a/docs/transformTransformation.python.md +++ b/docs/transformTransformation.python.md @@ -239,6 +239,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -324,6 +325,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/transformTransformation.typescript.md b/docs/transformTransformation.typescript.md index 2b472a4e..12c154d5 100644 --- a/docs/transformTransformation.typescript.md +++ b/docs/transformTransformation.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -134,6 +135,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/transitSecretBackendKey.csharp.md b/docs/transitSecretBackendKey.csharp.md index 76bbd699..b7e975b1 100644 --- a/docs/transitSecretBackendKey.csharp.md +++ b/docs/transitSecretBackendKey.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -138,6 +139,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/transitSecretBackendKey.go.md b/docs/transitSecretBackendKey.go.md index 9dbb37fa..6193afc7 100644 --- a/docs/transitSecretBackendKey.go.md +++ b/docs/transitSecretBackendKey.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transitsecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transitsecretbackendkey" transitsecretbackendkey.NewTransitSecretBackendKey(scope Construct, id *string, config TransitSecretBackendKeyConfig) TransitSecretBackendKey ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -138,6 +139,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -462,7 +469,7 @@ func ResetType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transitsecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transitsecretbackendkey" transitsecretbackendkey.TransitSecretBackendKey_IsConstruct(x interface{}) *bool ``` @@ -494,7 +501,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transitsecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transitsecretbackendkey" transitsecretbackendkey.TransitSecretBackendKey_IsTerraformElement(x interface{}) *bool ``` @@ -508,7 +515,7 @@ transitsecretbackendkey.TransitSecretBackendKey_IsTerraformElement(x interface{} ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transitsecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transitsecretbackendkey" transitsecretbackendkey.TransitSecretBackendKey_IsTerraformResource(x interface{}) *bool ``` @@ -522,7 +529,7 @@ transitsecretbackendkey.TransitSecretBackendKey_IsTerraformResource(x interface{ ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transitsecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transitsecretbackendkey" transitsecretbackendkey.TransitSecretBackendKey_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -1158,7 +1165,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transitsecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transitsecretbackendkey" &transitsecretbackendkey.TransitSecretBackendKeyConfig { Connection: interface{}, diff --git a/docs/transitSecretBackendKey.java.md b/docs/transitSecretBackendKey.java.md index 4725d935..3c9453a0 100644 --- a/docs/transitSecretBackendKey.java.md +++ b/docs/transitSecretBackendKey.java.md @@ -308,6 +308,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -392,6 +393,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/transitSecretBackendKey.python.md b/docs/transitSecretBackendKey.python.md index db297a42..46e7a51a 100644 --- a/docs/transitSecretBackendKey.python.md +++ b/docs/transitSecretBackendKey.python.md @@ -301,6 +301,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -390,6 +391,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/transitSecretBackendKey.typescript.md b/docs/transitSecretBackendKey.typescript.md index 83493431..ca943463 100644 --- a/docs/transitSecretBackendKey.typescript.md +++ b/docs/transitSecretBackendKey.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -138,6 +139,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/docs/transitSecretCacheConfig.csharp.md b/docs/transitSecretCacheConfig.csharp.md index 1274720d..7708757c 100644 --- a/docs/transitSecretCacheConfig.csharp.md +++ b/docs/transitSecretCacheConfig.csharp.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ private void ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + ##### `ToMetadata` ```csharp diff --git a/docs/transitSecretCacheConfig.go.md b/docs/transitSecretCacheConfig.go.md index 68b38d3f..c9ce97c7 100644 --- a/docs/transitSecretCacheConfig.go.md +++ b/docs/transitSecretCacheConfig.go.md @@ -9,7 +9,7 @@ Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23 #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transitsecretcacheconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transitsecretcacheconfig" transitsecretcacheconfig.NewTransitSecretCacheConfig(scope Construct, id *string, config TransitSecretCacheConfigConfig) TransitSecretCacheConfig ``` @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | AddOverride | *No description.* | | OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | | ToMetadata | *No description.* | | ToTerraform | Adds this resource to the terraform JSON output. | | AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ func ResetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + ##### `ToMetadata` ```go @@ -385,7 +392,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transitsecretcacheconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transitsecretcacheconfig" transitsecretcacheconfig.TransitSecretCacheConfig_IsConstruct(x interface{}) *bool ``` @@ -417,7 +424,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transitsecretcacheconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transitsecretcacheconfig" transitsecretcacheconfig.TransitSecretCacheConfig_IsTerraformElement(x interface{}) *bool ``` @@ -431,7 +438,7 @@ transitsecretcacheconfig.TransitSecretCacheConfig_IsTerraformElement(x interface ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transitsecretcacheconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transitsecretcacheconfig" transitsecretcacheconfig.TransitSecretCacheConfig_IsTerraformResource(x interface{}) *bool ``` @@ -445,7 +452,7 @@ transitsecretcacheconfig.TransitSecretCacheConfig_IsTerraformResource(x interfac ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transitsecretcacheconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transitsecretcacheconfig" transitsecretcacheconfig.TransitSecretCacheConfig_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -762,7 +769,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v11/transitsecretcacheconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transitsecretcacheconfig" &transitsecretcacheconfig.TransitSecretCacheConfigConfig { Connection: interface{}, diff --git a/docs/transitSecretCacheConfig.java.md b/docs/transitSecretCacheConfig.java.md index 30ca1b1a..57a91738 100644 --- a/docs/transitSecretCacheConfig.java.md +++ b/docs/transitSecretCacheConfig.java.md @@ -157,6 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -230,6 +231,12 @@ public void resetOverrideLogicalId() Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + ##### `toMetadata` ```java diff --git a/docs/transitSecretCacheConfig.python.md b/docs/transitSecretCacheConfig.python.md index 6ea9914c..c490f5a2 100644 --- a/docs/transitSecretCacheConfig.python.md +++ b/docs/transitSecretCacheConfig.python.md @@ -155,6 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | add_override | *No description.* | | override_logical_id | Overrides the auto-generated logical ID with a specific ID. | | reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | | to_metadata | *No description.* | | to_terraform | Adds this resource to the terraform JSON output. | | add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -233,6 +234,12 @@ def reset_override_logical_id() -> None Resets a previously passed logical Id to use the auto-generated logical id again. +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + ##### `to_metadata` ```python diff --git a/docs/transitSecretCacheConfig.typescript.md b/docs/transitSecretCacheConfig.typescript.md index 3883e9e8..d3f39a4a 100644 --- a/docs/transitSecretCacheConfig.typescript.md +++ b/docs/transitSecretCacheConfig.typescript.md @@ -54,6 +54,7 @@ Must be unique amongst siblings in the same scope | addOverride | *No description.* | | overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | | resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | | toMetadata | *No description.* | | toTerraform | Adds this resource to the terraform JSON output. | | addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | @@ -127,6 +128,12 @@ public resetOverrideLogicalId(): void Resets a previously passed logical Id to use the auto-generated logical id again. +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + ##### `toMetadata` ```typescript diff --git a/package.json b/package.json index b08e47bb..131665fe 100644 --- a/package.json +++ b/package.json @@ -47,8 +47,8 @@ "@actions/core": "^1.1.0", "@cdktf/provider-project": "^0.5.0", "@types/node": "^18", - "cdktf": "^0.19.0", - "cdktf-cli": "^0.19.0", + "cdktf": "^0.20.0", + "cdktf-cli": "^0.20.0", "constructs": "^10.3.0", "dot-prop": "^5.2.0", "jsii": "~5.2.0", @@ -56,13 +56,13 @@ "jsii-docgen": "^10.2.3", "jsii-pacmak": "^1.93.0", "jsii-rosetta": "~5.2.0", - "projen": "^0.78.11", + "projen": "^0.78.13", "semver": "^7.5.3", "standard-version": "^9", "typescript": "~5.2.0" }, "peerDependencies": { - "cdktf": "^0.19.0", + "cdktf": "^0.20.0", "constructs": "^10.3.0" }, "resolutions": { diff --git a/scripts/check-for-upgrades.js b/scripts/check-for-upgrades.js index e68bf45a..3313b84e 100644 --- a/scripts/check-for-upgrades.js +++ b/scripts/check-for-upgrades.js @@ -83,7 +83,7 @@ async function getCurrentProviderVersion() { } // SEE NOTICE AT THE TOP WHY THIS IS INLINED CURRENTLY -// copied from https://github.com/hashicorp/terraform-cdk/blob/b23fc173715e90c0a5b8c8633d9ec7f71edf9ed4/packages/cdktf-cli/lib/dependencies/version-constraints.ts +// copied from https://github.com/hashicorp/terraform-cdk/blob/df858ccf4ac71a168e3636f053c6743324c98332/packages/%40cdktf/cli-core/src/lib/dependencies/version-constraints.ts // and converted to JavaScript // constraints can be prefixed with "~>", ">", "<", "=", ">=", "<=" or "!=" @@ -122,16 +122,26 @@ function versionMatchesConstraint(version, constraint) { case "~>": { // allows rightmost version component to increment + const parts = parsed.version.split("."); + const minorSpecified = parts.length === 2; + const majorIsZero = parts[0] === "0"; + // ~>2.0 which allows 2.1 and 2.1.1 needs special handling as // npm semver handles "~" differently for ~2.0 than for ~2 or ~2.1.0 // So we need to use "^" (e.g. ^2.0) for this case // see: https://github.com/npm/node-semver/issues/11 - const allowMinorAndPatchOnly = parsed.version.split(".").length === 2; + const allowMinorAndPatchOnly = minorSpecified; - const range = allowMinorAndPatchOnly + let range = allowMinorAndPatchOnly ? `^${parsed.version}` : `~${parsed.version}`; + // versions below 1.0 are treated a bit differently in NPM than in Terraform + // meaning that NPMs ^0.4 doesn't allow 0.55 while TFs ~>0.4 allows 0.55 + if (majorIsZero && minorSpecified) { + range = `>=${parsed.version} <1.0.0`; + } + return semver.satisfies(version, range); } case ">=": diff --git a/src/ad-secret-backend/README.md b/src/ad-secret-backend/README.md index 2bbec5ba..b1c001ac 100644 --- a/src/ad-secret-backend/README.md +++ b/src/ad-secret-backend/README.md @@ -1,3 +1,3 @@ # `vault_ad_secret_backend` -Refer to the Terraform Registory for docs: [`vault_ad_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/ad_secret_backend). +Refer to the Terraform Registry for docs: [`vault_ad_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/ad_secret_backend). diff --git a/src/ad-secret-backend/index.ts b/src/ad-secret-backend/index.ts index e59570fd..41aa6602 100644 --- a/src/ad-secret-backend/index.ts +++ b/src/ad-secret-backend/index.ts @@ -962,4 +962,234 @@ export class AdSecretBackend extends cdktf.TerraformResource { userdn: cdktf.stringToTerraform(this._userdn), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + anonymous_group_search: { + value: cdktf.booleanToHclTerraform(this._anonymousGroupSearch), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + binddn: { + value: cdktf.stringToHclTerraform(this._binddn), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + bindpass: { + value: cdktf.stringToHclTerraform(this._bindpass), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + case_sensitive_names: { + value: cdktf.booleanToHclTerraform(this._caseSensitiveNames), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + certificate: { + value: cdktf.stringToHclTerraform(this._certificate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + client_tls_cert: { + value: cdktf.stringToHclTerraform(this._clientTlsCert), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + client_tls_key: { + value: cdktf.stringToHclTerraform(this._clientTlsKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + default_lease_ttl_seconds: { + value: cdktf.numberToHclTerraform(this._defaultLeaseTtlSeconds), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + deny_null_bind: { + value: cdktf.booleanToHclTerraform(this._denyNullBind), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + description: { + value: cdktf.stringToHclTerraform(this._description), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disable_remount: { + value: cdktf.booleanToHclTerraform(this._disableRemount), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + discoverdn: { + value: cdktf.booleanToHclTerraform(this._discoverdn), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + formatter: { + value: cdktf.stringToHclTerraform(this._formatter), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + groupattr: { + value: cdktf.stringToHclTerraform(this._groupattr), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + groupdn: { + value: cdktf.stringToHclTerraform(this._groupdn), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + groupfilter: { + value: cdktf.stringToHclTerraform(this._groupfilter), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + insecure_tls: { + value: cdktf.booleanToHclTerraform(this._insecureTls), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + last_rotation_tolerance: { + value: cdktf.numberToHclTerraform(this._lastRotationTolerance), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + length: { + value: cdktf.numberToHclTerraform(this._length), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + local: { + value: cdktf.booleanToHclTerraform(this._local), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + max_lease_ttl_seconds: { + value: cdktf.numberToHclTerraform(this._maxLeaseTtlSeconds), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_ttl: { + value: cdktf.numberToHclTerraform(this._maxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + password_policy: { + value: cdktf.stringToHclTerraform(this._passwordPolicy), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + request_timeout: { + value: cdktf.numberToHclTerraform(this._requestTimeout), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + starttls: { + value: cdktf.booleanToHclTerraform(this._starttls), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + tls_max_version: { + value: cdktf.stringToHclTerraform(this._tlsMaxVersion), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + tls_min_version: { + value: cdktf.stringToHclTerraform(this._tlsMinVersion), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ttl: { + value: cdktf.numberToHclTerraform(this._ttl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + upndomain: { + value: cdktf.stringToHclTerraform(this._upndomain), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + url: { + value: cdktf.stringToHclTerraform(this._url), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + use_pre111_group_cn_behavior: { + value: cdktf.booleanToHclTerraform(this._usePre111GroupCnBehavior), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + use_token_groups: { + value: cdktf.booleanToHclTerraform(this._useTokenGroups), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + userattr: { + value: cdktf.stringToHclTerraform(this._userattr), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + userdn: { + value: cdktf.stringToHclTerraform(this._userdn), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/ad-secret-library/README.md b/src/ad-secret-library/README.md index ac117264..16fd73f8 100644 --- a/src/ad-secret-library/README.md +++ b/src/ad-secret-library/README.md @@ -1,3 +1,3 @@ # `vault_ad_secret_library` -Refer to the Terraform Registory for docs: [`vault_ad_secret_library`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/ad_secret_library). +Refer to the Terraform Registry for docs: [`vault_ad_secret_library`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/ad_secret_library). diff --git a/src/ad-secret-library/index.ts b/src/ad-secret-library/index.ts index e3877fdd..035e02fe 100644 --- a/src/ad-secret-library/index.ts +++ b/src/ad-secret-library/index.ts @@ -263,4 +263,60 @@ export class AdSecretLibrary extends cdktf.TerraformResource { ttl: cdktf.numberToTerraform(this._ttl), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disable_check_in_enforcement: { + value: cdktf.booleanToHclTerraform(this._disableCheckInEnforcement), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_ttl: { + value: cdktf.numberToHclTerraform(this._maxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + service_account_names: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._serviceAccountNames), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + ttl: { + value: cdktf.numberToHclTerraform(this._ttl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/ad-secret-role/README.md b/src/ad-secret-role/README.md index bb84e5a7..1f0bc03d 100644 --- a/src/ad-secret-role/README.md +++ b/src/ad-secret-role/README.md @@ -1,3 +1,3 @@ # `vault_ad_secret_role` -Refer to the Terraform Registory for docs: [`vault_ad_secret_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/ad_secret_role). +Refer to the Terraform Registry for docs: [`vault_ad_secret_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/ad_secret_role). diff --git a/src/ad-secret-role/index.ts b/src/ad-secret-role/index.ts index dfccce88..ead3c154 100644 --- a/src/ad-secret-role/index.ts +++ b/src/ad-secret-role/index.ts @@ -225,4 +225,48 @@ export class AdSecretRole extends cdktf.TerraformResource { ttl: cdktf.numberToTerraform(this._ttl), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role: { + value: cdktf.stringToHclTerraform(this._role), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + service_account_name: { + value: cdktf.stringToHclTerraform(this._serviceAccountName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ttl: { + value: cdktf.numberToHclTerraform(this._ttl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/alicloud-auth-backend-role/README.md b/src/alicloud-auth-backend-role/README.md index 9e5483b6..135d80e3 100644 --- a/src/alicloud-auth-backend-role/README.md +++ b/src/alicloud-auth-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_alicloud_auth_backend_role` -Refer to the Terraform Registory for docs: [`vault_alicloud_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/alicloud_auth_backend_role). +Refer to the Terraform Registry for docs: [`vault_alicloud_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/alicloud_auth_backend_role). diff --git a/src/alicloud-auth-backend-role/index.ts b/src/alicloud-auth-backend-role/index.ts index f8b49f9a..2287517a 100644 --- a/src/alicloud-auth-backend-role/index.ts +++ b/src/alicloud-auth-backend-role/index.ts @@ -410,4 +410,96 @@ export class AlicloudAuthBackendRole extends cdktf.TerraformResource { token_type: cdktf.stringToTerraform(this._tokenType), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + arn: { + value: cdktf.stringToHclTerraform(this._arn), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role: { + value: cdktf.stringToHclTerraform(this._role), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + token_bound_cidrs: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenBoundCidrs), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_explicit_max_ttl: { + value: cdktf.numberToHclTerraform(this._tokenExplicitMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_max_ttl: { + value: cdktf.numberToHclTerraform(this._tokenMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_no_default_policy: { + value: cdktf.booleanToHclTerraform(this._tokenNoDefaultPolicy), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + token_num_uses: { + value: cdktf.numberToHclTerraform(this._tokenNumUses), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_period: { + value: cdktf.numberToHclTerraform(this._tokenPeriod), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenPolicies), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_ttl: { + value: cdktf.numberToHclTerraform(this._tokenTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_type: { + value: cdktf.stringToHclTerraform(this._tokenType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/approle-auth-backend-login/README.md b/src/approle-auth-backend-login/README.md index 5af477cd..345e8f46 100644 --- a/src/approle-auth-backend-login/README.md +++ b/src/approle-auth-backend-login/README.md @@ -1,3 +1,3 @@ # `vault_approle_auth_backend_login` -Refer to the Terraform Registory for docs: [`vault_approle_auth_backend_login`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/approle_auth_backend_login). +Refer to the Terraform Registry for docs: [`vault_approle_auth_backend_login`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/approle_auth_backend_login). diff --git a/src/approle-auth-backend-login/index.ts b/src/approle-auth-backend-login/index.ts index e759848a..f0a2e0ca 100644 --- a/src/approle-auth-backend-login/index.ts +++ b/src/approle-auth-backend-login/index.ts @@ -233,4 +233,42 @@ export class ApproleAuthBackendLogin extends cdktf.TerraformResource { secret_id: cdktf.stringToTerraform(this._secretId), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role_id: { + value: cdktf.stringToHclTerraform(this._roleId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + secret_id: { + value: cdktf.stringToHclTerraform(this._secretId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/approle-auth-backend-role-secret-id/README.md b/src/approle-auth-backend-role-secret-id/README.md index 9d680335..afca61da 100644 --- a/src/approle-auth-backend-role-secret-id/README.md +++ b/src/approle-auth-backend-role-secret-id/README.md @@ -1,3 +1,3 @@ # `vault_approle_auth_backend_role_secret_id` -Refer to the Terraform Registory for docs: [`vault_approle_auth_backend_role_secret_id`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/approle_auth_backend_role_secret_id). +Refer to the Terraform Registry for docs: [`vault_approle_auth_backend_role_secret_id`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/approle_auth_backend_role_secret_id). diff --git a/src/approle-auth-backend-role-secret-id/index.ts b/src/approle-auth-backend-role-secret-id/index.ts index f153bea0..4b1da38c 100644 --- a/src/approle-auth-backend-role-secret-id/index.ts +++ b/src/approle-auth-backend-role-secret-id/index.ts @@ -308,4 +308,66 @@ export class ApproleAuthBackendRoleSecretId extends cdktf.TerraformResource { wrapping_ttl: cdktf.stringToTerraform(this._wrappingTtl), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + cidr_list: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._cidrList), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + metadata: { + value: cdktf.stringToHclTerraform(this._metadata), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role_name: { + value: cdktf.stringToHclTerraform(this._roleName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + secret_id: { + value: cdktf.stringToHclTerraform(this._secretId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + with_wrapped_accessor: { + value: cdktf.booleanToHclTerraform(this._withWrappedAccessor), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + wrapping_ttl: { + value: cdktf.stringToHclTerraform(this._wrappingTtl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/approle-auth-backend-role/README.md b/src/approle-auth-backend-role/README.md index 5e996bf9..fa78915d 100644 --- a/src/approle-auth-backend-role/README.md +++ b/src/approle-auth-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_approle_auth_backend_role` -Refer to the Terraform Registory for docs: [`vault_approle_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/approle_auth_backend_role). +Refer to the Terraform Registry for docs: [`vault_approle_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/approle_auth_backend_role). diff --git a/src/approle-auth-backend-role/index.ts b/src/approle-auth-backend-role/index.ts index cc67905e..6b3c736a 100644 --- a/src/approle-auth-backend-role/index.ts +++ b/src/approle-auth-backend-role/index.ts @@ -509,4 +509,120 @@ export class ApproleAuthBackendRole extends cdktf.TerraformResource { token_type: cdktf.stringToTerraform(this._tokenType), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + bind_secret_id: { + value: cdktf.booleanToHclTerraform(this._bindSecretId), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role_id: { + value: cdktf.stringToHclTerraform(this._roleId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role_name: { + value: cdktf.stringToHclTerraform(this._roleName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + secret_id_bound_cidrs: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._secretIdBoundCidrs), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + secret_id_num_uses: { + value: cdktf.numberToHclTerraform(this._secretIdNumUses), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + secret_id_ttl: { + value: cdktf.numberToHclTerraform(this._secretIdTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_bound_cidrs: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenBoundCidrs), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_explicit_max_ttl: { + value: cdktf.numberToHclTerraform(this._tokenExplicitMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_max_ttl: { + value: cdktf.numberToHclTerraform(this._tokenMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_no_default_policy: { + value: cdktf.booleanToHclTerraform(this._tokenNoDefaultPolicy), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + token_num_uses: { + value: cdktf.numberToHclTerraform(this._tokenNumUses), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_period: { + value: cdktf.numberToHclTerraform(this._tokenPeriod), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenPolicies), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_ttl: { + value: cdktf.numberToHclTerraform(this._tokenTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_type: { + value: cdktf.stringToHclTerraform(this._tokenType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/audit-request-header/README.md b/src/audit-request-header/README.md index 77060dbe..cecf533c 100644 --- a/src/audit-request-header/README.md +++ b/src/audit-request-header/README.md @@ -1,3 +1,3 @@ # `vault_audit_request_header` -Refer to the Terraform Registory for docs: [`vault_audit_request_header`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/audit_request_header). +Refer to the Terraform Registry for docs: [`vault_audit_request_header`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/audit_request_header). diff --git a/src/audit-request-header/index.ts b/src/audit-request-header/index.ts index 5b6db682..fa9dd56f 100644 --- a/src/audit-request-header/index.ts +++ b/src/audit-request-header/index.ts @@ -173,4 +173,36 @@ export class AuditRequestHeader extends cdktf.TerraformResource { namespace: cdktf.stringToTerraform(this._namespace), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + hmac: { + value: cdktf.booleanToHclTerraform(this._hmac), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/audit/README.md b/src/audit/README.md index 55b871bb..6e37dc0c 100644 --- a/src/audit/README.md +++ b/src/audit/README.md @@ -1,3 +1,3 @@ # `vault_audit` -Refer to the Terraform Registory for docs: [`vault_audit`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/audit). +Refer to the Terraform Registry for docs: [`vault_audit`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/audit). diff --git a/src/audit/index.ts b/src/audit/index.ts index e58d5afe..b6ccc15d 100644 --- a/src/audit/index.ts +++ b/src/audit/index.ts @@ -242,4 +242,54 @@ export class Audit extends cdktf.TerraformResource { type: cdktf.stringToTerraform(this._type), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + description: { + value: cdktf.stringToHclTerraform(this._description), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + local: { + value: cdktf.booleanToHclTerraform(this._local), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + options: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(this._options), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + type: { + value: cdktf.stringToHclTerraform(this._type), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/auth-backend/README.md b/src/auth-backend/README.md index f891951c..44bd8665 100644 --- a/src/auth-backend/README.md +++ b/src/auth-backend/README.md @@ -1,3 +1,3 @@ # `vault_auth_backend` -Refer to the Terraform Registory for docs: [`vault_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/auth_backend). +Refer to the Terraform Registry for docs: [`vault_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/auth_backend). diff --git a/src/auth-backend/index.ts b/src/auth-backend/index.ts index 17100848..2ab336ad 100644 --- a/src/auth-backend/index.ts +++ b/src/auth-backend/index.ts @@ -112,6 +112,67 @@ export function authBackendTuneToTerraform(struct?: AuthBackendTune | cdktf.IRes } } + +export function authBackendTuneToHclTerraform(struct?: AuthBackendTune | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + allowed_response_headers: { + value: struct!.allowedResponseHeaders === undefined ? null : cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.allowedResponseHeaders), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + audit_non_hmac_request_keys: { + value: struct!.auditNonHmacRequestKeys === undefined ? null : cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.auditNonHmacRequestKeys), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + audit_non_hmac_response_keys: { + value: struct!.auditNonHmacResponseKeys === undefined ? null : cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.auditNonHmacResponseKeys), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + default_lease_ttl: { + value: struct!.defaultLeaseTtl === undefined ? null : cdktf.stringToHclTerraform(struct!.defaultLeaseTtl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + listing_visibility: { + value: struct!.listingVisibility === undefined ? null : cdktf.stringToHclTerraform(struct!.listingVisibility), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_lease_ttl: { + value: struct!.maxLeaseTtl === undefined ? null : cdktf.stringToHclTerraform(struct!.maxLeaseTtl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + passthrough_request_headers: { + value: struct!.passthroughRequestHeaders === undefined ? null : cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.passthroughRequestHeaders), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + token_type: { + value: struct!.tokenType === undefined ? null : cdktf.stringToHclTerraform(struct!.tokenType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class AuthBackendTuneOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -558,4 +619,60 @@ export class AuthBackend extends cdktf.TerraformResource { type: cdktf.stringToTerraform(this._type), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + description: { + value: cdktf.stringToHclTerraform(this._description), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disable_remount: { + value: cdktf.booleanToHclTerraform(this._disableRemount), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + local: { + value: cdktf.booleanToHclTerraform(this._local), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + tune: { + value: cdktf.listMapperHcl(authBackendTuneToHclTerraform, false)(this._tune.internalValue), + isBlock: true, + type: "set", + storageClassType: "AuthBackendTuneList", + }, + type: { + value: cdktf.stringToHclTerraform(this._type), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/aws-auth-backend-cert/README.md b/src/aws-auth-backend-cert/README.md index 0fa3105f..cbd8fb39 100644 --- a/src/aws-auth-backend-cert/README.md +++ b/src/aws-auth-backend-cert/README.md @@ -1,3 +1,3 @@ # `vault_aws_auth_backend_cert` -Refer to the Terraform Registory for docs: [`vault_aws_auth_backend_cert`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/aws_auth_backend_cert). +Refer to the Terraform Registry for docs: [`vault_aws_auth_backend_cert`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/aws_auth_backend_cert). diff --git a/src/aws-auth-backend-cert/index.ts b/src/aws-auth-backend-cert/index.ts index 8de32fac..50e1a44c 100644 --- a/src/aws-auth-backend-cert/index.ts +++ b/src/aws-auth-backend-cert/index.ts @@ -218,4 +218,48 @@ export class AwsAuthBackendCert extends cdktf.TerraformResource { type: cdktf.stringToTerraform(this._type), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + aws_public_cert: { + value: cdktf.stringToHclTerraform(this._awsPublicCert), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + cert_name: { + value: cdktf.stringToHclTerraform(this._certName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + type: { + value: cdktf.stringToHclTerraform(this._type), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/aws-auth-backend-client/README.md b/src/aws-auth-backend-client/README.md index 06c14d8c..5246d520 100644 --- a/src/aws-auth-backend-client/README.md +++ b/src/aws-auth-backend-client/README.md @@ -1,3 +1,3 @@ # `vault_aws_auth_backend_client` -Refer to the Terraform Registory for docs: [`vault_aws_auth_backend_client`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/aws_auth_backend_client). +Refer to the Terraform Registry for docs: [`vault_aws_auth_backend_client`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/aws_auth_backend_client). diff --git a/src/aws-auth-backend-client/index.ts b/src/aws-auth-backend-client/index.ts index 83af0ddd..481370ff 100644 --- a/src/aws-auth-backend-client/index.ts +++ b/src/aws-auth-backend-client/index.ts @@ -344,4 +344,78 @@ export class AwsAuthBackendClient extends cdktf.TerraformResource { use_sts_region_from_client: cdktf.booleanToTerraform(this._useStsRegionFromClient), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + access_key: { + value: cdktf.stringToHclTerraform(this._accessKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ec2_endpoint: { + value: cdktf.stringToHclTerraform(this._ec2Endpoint), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + iam_endpoint: { + value: cdktf.stringToHclTerraform(this._iamEndpoint), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + iam_server_id_header_value: { + value: cdktf.stringToHclTerraform(this._iamServerIdHeaderValue), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + secret_key: { + value: cdktf.stringToHclTerraform(this._secretKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + sts_endpoint: { + value: cdktf.stringToHclTerraform(this._stsEndpoint), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + sts_region: { + value: cdktf.stringToHclTerraform(this._stsRegion), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + use_sts_region_from_client: { + value: cdktf.booleanToHclTerraform(this._useStsRegionFromClient), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/aws-auth-backend-config-identity/README.md b/src/aws-auth-backend-config-identity/README.md index 9348866d..2805770f 100644 --- a/src/aws-auth-backend-config-identity/README.md +++ b/src/aws-auth-backend-config-identity/README.md @@ -1,3 +1,3 @@ # `vault_aws_auth_backend_config_identity` -Refer to the Terraform Registory for docs: [`vault_aws_auth_backend_config_identity`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/aws_auth_backend_config_identity). +Refer to the Terraform Registry for docs: [`vault_aws_auth_backend_config_identity`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/aws_auth_backend_config_identity). diff --git a/src/aws-auth-backend-config-identity/index.ts b/src/aws-auth-backend-config-identity/index.ts index 11c83a9d..63957398 100644 --- a/src/aws-auth-backend-config-identity/index.ts +++ b/src/aws-auth-backend-config-identity/index.ts @@ -248,4 +248,54 @@ export class AwsAuthBackendConfigIdentity extends cdktf.TerraformResource { namespace: cdktf.stringToTerraform(this._namespace), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ec2_alias: { + value: cdktf.stringToHclTerraform(this._ec2Alias), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ec2_metadata: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._ec2Metadata), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + iam_alias: { + value: cdktf.stringToHclTerraform(this._iamAlias), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + iam_metadata: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._iamMetadata), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/aws-auth-backend-identity-whitelist/README.md b/src/aws-auth-backend-identity-whitelist/README.md index f7beb540..99dd3220 100644 --- a/src/aws-auth-backend-identity-whitelist/README.md +++ b/src/aws-auth-backend-identity-whitelist/README.md @@ -1,3 +1,3 @@ # `vault_aws_auth_backend_identity_whitelist` -Refer to the Terraform Registory for docs: [`vault_aws_auth_backend_identity_whitelist`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/aws_auth_backend_identity_whitelist). +Refer to the Terraform Registry for docs: [`vault_aws_auth_backend_identity_whitelist`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/aws_auth_backend_identity_whitelist). diff --git a/src/aws-auth-backend-identity-whitelist/index.ts b/src/aws-auth-backend-identity-whitelist/index.ts index bfcb3b26..8025ab45 100644 --- a/src/aws-auth-backend-identity-whitelist/index.ts +++ b/src/aws-auth-backend-identity-whitelist/index.ts @@ -200,4 +200,42 @@ export class AwsAuthBackendIdentityWhitelist extends cdktf.TerraformResource { safety_buffer: cdktf.numberToTerraform(this._safetyBuffer), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disable_periodic_tidy: { + value: cdktf.booleanToHclTerraform(this._disablePeriodicTidy), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + safety_buffer: { + value: cdktf.numberToHclTerraform(this._safetyBuffer), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/aws-auth-backend-login/README.md b/src/aws-auth-backend-login/README.md index 56a5f599..14812391 100644 --- a/src/aws-auth-backend-login/README.md +++ b/src/aws-auth-backend-login/README.md @@ -1,3 +1,3 @@ # `vault_aws_auth_backend_login` -Refer to the Terraform Registory for docs: [`vault_aws_auth_backend_login`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/aws_auth_backend_login). +Refer to the Terraform Registry for docs: [`vault_aws_auth_backend_login`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/aws_auth_backend_login). diff --git a/src/aws-auth-backend-login/index.ts b/src/aws-auth-backend-login/index.ts index 56b6501b..aacfd592 100644 --- a/src/aws-auth-backend-login/index.ts +++ b/src/aws-auth-backend-login/index.ts @@ -409,4 +409,84 @@ export class AwsAuthBackendLogin extends cdktf.TerraformResource { signature: cdktf.stringToTerraform(this._signature), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + iam_http_request_method: { + value: cdktf.stringToHclTerraform(this._iamHttpRequestMethod), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + iam_request_body: { + value: cdktf.stringToHclTerraform(this._iamRequestBody), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + iam_request_headers: { + value: cdktf.stringToHclTerraform(this._iamRequestHeaders), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + iam_request_url: { + value: cdktf.stringToHclTerraform(this._iamRequestUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + identity: { + value: cdktf.stringToHclTerraform(this._identity), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + nonce: { + value: cdktf.stringToHclTerraform(this._nonce), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + pkcs7: { + value: cdktf.stringToHclTerraform(this._pkcs7), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role: { + value: cdktf.stringToHclTerraform(this._role), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + signature: { + value: cdktf.stringToHclTerraform(this._signature), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/aws-auth-backend-role-tag/README.md b/src/aws-auth-backend-role-tag/README.md index 8e3d7eb5..d4946708 100644 --- a/src/aws-auth-backend-role-tag/README.md +++ b/src/aws-auth-backend-role-tag/README.md @@ -1,3 +1,3 @@ # `vault_aws_auth_backend_role_tag` -Refer to the Terraform Registory for docs: [`vault_aws_auth_backend_role_tag`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/aws_auth_backend_role_tag). +Refer to the Terraform Registry for docs: [`vault_aws_auth_backend_role_tag`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/aws_auth_backend_role_tag). diff --git a/src/aws-auth-backend-role-tag/index.ts b/src/aws-auth-backend-role-tag/index.ts index 82097304..e4da2094 100644 --- a/src/aws-auth-backend-role-tag/index.ts +++ b/src/aws-auth-backend-role-tag/index.ts @@ -303,4 +303,66 @@ export class AwsAuthBackendRoleTag extends cdktf.TerraformResource { role: cdktf.stringToTerraform(this._role), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + allow_instance_migration: { + value: cdktf.booleanToHclTerraform(this._allowInstanceMigration), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disallow_reauthentication: { + value: cdktf.booleanToHclTerraform(this._disallowReauthentication), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + instance_id: { + value: cdktf.stringToHclTerraform(this._instanceId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_ttl: { + value: cdktf.stringToHclTerraform(this._maxTtl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._policies), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + role: { + value: cdktf.stringToHclTerraform(this._role), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/aws-auth-backend-role/README.md b/src/aws-auth-backend-role/README.md index a01de7eb..b14f1b09 100644 --- a/src/aws-auth-backend-role/README.md +++ b/src/aws-auth-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_aws_auth_backend_role` -Refer to the Terraform Registory for docs: [`vault_aws_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/aws_auth_backend_role). +Refer to the Terraform Registry for docs: [`vault_aws_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/aws_auth_backend_role). diff --git a/src/aws-auth-backend-role/index.ts b/src/aws-auth-backend-role/index.ts index 818b895f..a0be227e 100644 --- a/src/aws-auth-backend-role/index.ts +++ b/src/aws-auth-backend-role/index.ts @@ -778,4 +778,186 @@ export class AwsAuthBackendRole extends cdktf.TerraformResource { token_type: cdktf.stringToTerraform(this._tokenType), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + allow_instance_migration: { + value: cdktf.booleanToHclTerraform(this._allowInstanceMigration), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + auth_type: { + value: cdktf.stringToHclTerraform(this._authType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + bound_account_ids: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._boundAccountIds), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + bound_ami_ids: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._boundAmiIds), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + bound_ec2_instance_ids: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._boundEc2InstanceIds), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + bound_iam_instance_profile_arns: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._boundIamInstanceProfileArns), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + bound_iam_principal_arns: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._boundIamPrincipalArns), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + bound_iam_role_arns: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._boundIamRoleArns), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + bound_regions: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._boundRegions), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + bound_subnet_ids: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._boundSubnetIds), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + bound_vpc_ids: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._boundVpcIds), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + disallow_reauthentication: { + value: cdktf.booleanToHclTerraform(this._disallowReauthentication), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + inferred_aws_region: { + value: cdktf.stringToHclTerraform(this._inferredAwsRegion), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + inferred_entity_type: { + value: cdktf.stringToHclTerraform(this._inferredEntityType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + resolve_aws_unique_ids: { + value: cdktf.booleanToHclTerraform(this._resolveAwsUniqueIds), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + role: { + value: cdktf.stringToHclTerraform(this._role), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role_tag: { + value: cdktf.stringToHclTerraform(this._roleTag), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + token_bound_cidrs: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenBoundCidrs), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_explicit_max_ttl: { + value: cdktf.numberToHclTerraform(this._tokenExplicitMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_max_ttl: { + value: cdktf.numberToHclTerraform(this._tokenMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_no_default_policy: { + value: cdktf.booleanToHclTerraform(this._tokenNoDefaultPolicy), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + token_num_uses: { + value: cdktf.numberToHclTerraform(this._tokenNumUses), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_period: { + value: cdktf.numberToHclTerraform(this._tokenPeriod), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenPolicies), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_ttl: { + value: cdktf.numberToHclTerraform(this._tokenTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_type: { + value: cdktf.stringToHclTerraform(this._tokenType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/aws-auth-backend-roletag-blacklist/README.md b/src/aws-auth-backend-roletag-blacklist/README.md index c04f6b4e..d678c3f6 100644 --- a/src/aws-auth-backend-roletag-blacklist/README.md +++ b/src/aws-auth-backend-roletag-blacklist/README.md @@ -1,3 +1,3 @@ # `vault_aws_auth_backend_roletag_blacklist` -Refer to the Terraform Registory for docs: [`vault_aws_auth_backend_roletag_blacklist`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/aws_auth_backend_roletag_blacklist). +Refer to the Terraform Registry for docs: [`vault_aws_auth_backend_roletag_blacklist`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/aws_auth_backend_roletag_blacklist). diff --git a/src/aws-auth-backend-roletag-blacklist/index.ts b/src/aws-auth-backend-roletag-blacklist/index.ts index 23d83b7e..d58cd7f8 100644 --- a/src/aws-auth-backend-roletag-blacklist/index.ts +++ b/src/aws-auth-backend-roletag-blacklist/index.ts @@ -197,4 +197,42 @@ export class AwsAuthBackendRoletagBlacklist extends cdktf.TerraformResource { safety_buffer: cdktf.numberToTerraform(this._safetyBuffer), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disable_periodic_tidy: { + value: cdktf.booleanToHclTerraform(this._disablePeriodicTidy), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + safety_buffer: { + value: cdktf.numberToHclTerraform(this._safetyBuffer), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/aws-auth-backend-sts-role/README.md b/src/aws-auth-backend-sts-role/README.md index 81e8f0e0..6b0273d1 100644 --- a/src/aws-auth-backend-sts-role/README.md +++ b/src/aws-auth-backend-sts-role/README.md @@ -1,3 +1,3 @@ # `vault_aws_auth_backend_sts_role` -Refer to the Terraform Registory for docs: [`vault_aws_auth_backend_sts_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/aws_auth_backend_sts_role). +Refer to the Terraform Registry for docs: [`vault_aws_auth_backend_sts_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/aws_auth_backend_sts_role). diff --git a/src/aws-auth-backend-sts-role/index.ts b/src/aws-auth-backend-sts-role/index.ts index f8572a13..3b66e8ef 100644 --- a/src/aws-auth-backend-sts-role/index.ts +++ b/src/aws-auth-backend-sts-role/index.ts @@ -194,4 +194,42 @@ export class AwsAuthBackendStsRole extends cdktf.TerraformResource { sts_role: cdktf.stringToTerraform(this._stsRole), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + account_id: { + value: cdktf.stringToHclTerraform(this._accountId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + sts_role: { + value: cdktf.stringToHclTerraform(this._stsRole), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/aws-secret-backend-role/README.md b/src/aws-secret-backend-role/README.md index da8f00cc..2bf10868 100644 --- a/src/aws-secret-backend-role/README.md +++ b/src/aws-secret-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_aws_secret_backend_role` -Refer to the Terraform Registory for docs: [`vault_aws_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/aws_secret_backend_role). +Refer to the Terraform Registry for docs: [`vault_aws_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/aws_secret_backend_role). diff --git a/src/aws-secret-backend-role/index.ts b/src/aws-secret-backend-role/index.ts index 514f787a..006369f8 100644 --- a/src/aws-secret-backend-role/index.ts +++ b/src/aws-secret-backend-role/index.ts @@ -383,4 +383,90 @@ export class AwsSecretBackendRole extends cdktf.TerraformResource { user_path: cdktf.stringToTerraform(this._userPath), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + credential_type: { + value: cdktf.stringToHclTerraform(this._credentialType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + default_sts_ttl: { + value: cdktf.numberToHclTerraform(this._defaultStsTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + iam_groups: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._iamGroups), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_sts_ttl: { + value: cdktf.numberToHclTerraform(this._maxStsTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + permissions_boundary_arn: { + value: cdktf.stringToHclTerraform(this._permissionsBoundaryArn), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + policy_arns: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._policyArns), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + policy_document: { + value: cdktf.stringToHclTerraform(this._policyDocument), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role_arns: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._roleArns), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + user_path: { + value: cdktf.stringToHclTerraform(this._userPath), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/aws-secret-backend-static-role/README.md b/src/aws-secret-backend-static-role/README.md index 8064daba..c17a170d 100644 --- a/src/aws-secret-backend-static-role/README.md +++ b/src/aws-secret-backend-static-role/README.md @@ -1,3 +1,3 @@ # `vault_aws_secret_backend_static_role` -Refer to the Terraform Registory for docs: [`vault_aws_secret_backend_static_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/aws_secret_backend_static_role). +Refer to the Terraform Registry for docs: [`vault_aws_secret_backend_static_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/aws_secret_backend_static_role). diff --git a/src/aws-secret-backend-static-role/index.ts b/src/aws-secret-backend-static-role/index.ts index 41f50f0a..0a211571 100644 --- a/src/aws-secret-backend-static-role/index.ts +++ b/src/aws-secret-backend-static-role/index.ts @@ -215,4 +215,48 @@ export class AwsSecretBackendStaticRole extends cdktf.TerraformResource { username: cdktf.stringToTerraform(this._username), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + rotation_period: { + value: cdktf.numberToHclTerraform(this._rotationPeriod), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + username: { + value: cdktf.stringToHclTerraform(this._username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/aws-secret-backend/README.md b/src/aws-secret-backend/README.md index a48984b4..5777b09c 100644 --- a/src/aws-secret-backend/README.md +++ b/src/aws-secret-backend/README.md @@ -1,3 +1,3 @@ # `vault_aws_secret_backend` -Refer to the Terraform Registory for docs: [`vault_aws_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/aws_secret_backend). +Refer to the Terraform Registry for docs: [`vault_aws_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/aws_secret_backend). diff --git a/src/aws-secret-backend/index.ts b/src/aws-secret-backend/index.ts index 10b6dbf7..ee26dd48 100644 --- a/src/aws-secret-backend/index.ts +++ b/src/aws-secret-backend/index.ts @@ -416,4 +416,96 @@ export class AwsSecretBackend extends cdktf.TerraformResource { username_template: cdktf.stringToTerraform(this._usernameTemplate), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + access_key: { + value: cdktf.stringToHclTerraform(this._accessKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + default_lease_ttl_seconds: { + value: cdktf.numberToHclTerraform(this._defaultLeaseTtlSeconds), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + description: { + value: cdktf.stringToHclTerraform(this._description), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disable_remount: { + value: cdktf.booleanToHclTerraform(this._disableRemount), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + iam_endpoint: { + value: cdktf.stringToHclTerraform(this._iamEndpoint), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + local: { + value: cdktf.booleanToHclTerraform(this._local), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + max_lease_ttl_seconds: { + value: cdktf.numberToHclTerraform(this._maxLeaseTtlSeconds), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + region: { + value: cdktf.stringToHclTerraform(this._region), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + secret_key: { + value: cdktf.stringToHclTerraform(this._secretKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + sts_endpoint: { + value: cdktf.stringToHclTerraform(this._stsEndpoint), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_template: { + value: cdktf.stringToHclTerraform(this._usernameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/azure-auth-backend-config/README.md b/src/azure-auth-backend-config/README.md index 9691b702..4460f486 100644 --- a/src/azure-auth-backend-config/README.md +++ b/src/azure-auth-backend-config/README.md @@ -1,3 +1,3 @@ # `vault_azure_auth_backend_config` -Refer to the Terraform Registory for docs: [`vault_azure_auth_backend_config`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/azure_auth_backend_config). +Refer to the Terraform Registry for docs: [`vault_azure_auth_backend_config`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/azure_auth_backend_config). diff --git a/src/azure-auth-backend-config/index.ts b/src/azure-auth-backend-config/index.ts index 398433ff..f175751b 100644 --- a/src/azure-auth-backend-config/index.ts +++ b/src/azure-auth-backend-config/index.ts @@ -266,4 +266,60 @@ export class AzureAuthBackendConfig extends cdktf.TerraformResource { tenant_id: cdktf.stringToTerraform(this._tenantId), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + client_id: { + value: cdktf.stringToHclTerraform(this._clientId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + client_secret: { + value: cdktf.stringToHclTerraform(this._clientSecret), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + environment: { + value: cdktf.stringToHclTerraform(this._environment), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + resource: { + value: cdktf.stringToHclTerraform(this._resource), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + tenant_id: { + value: cdktf.stringToHclTerraform(this._tenantId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/azure-auth-backend-role/README.md b/src/azure-auth-backend-role/README.md index 9137b387..6fc28c74 100644 --- a/src/azure-auth-backend-role/README.md +++ b/src/azure-auth-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_azure_auth_backend_role` -Refer to the Terraform Registory for docs: [`vault_azure_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/azure_auth_backend_role). +Refer to the Terraform Registry for docs: [`vault_azure_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/azure_auth_backend_role). diff --git a/src/azure-auth-backend-role/index.ts b/src/azure-auth-backend-role/index.ts index 3ee03156..d96145cd 100644 --- a/src/azure-auth-backend-role/index.ts +++ b/src/azure-auth-backend-role/index.ts @@ -533,4 +533,126 @@ export class AzureAuthBackendRole extends cdktf.TerraformResource { token_type: cdktf.stringToTerraform(this._tokenType), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + bound_group_ids: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._boundGroupIds), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + bound_locations: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._boundLocations), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + bound_resource_groups: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._boundResourceGroups), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + bound_scale_sets: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._boundScaleSets), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + bound_service_principal_ids: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._boundServicePrincipalIds), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + bound_subscription_ids: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._boundSubscriptionIds), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role: { + value: cdktf.stringToHclTerraform(this._role), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + token_bound_cidrs: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenBoundCidrs), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_explicit_max_ttl: { + value: cdktf.numberToHclTerraform(this._tokenExplicitMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_max_ttl: { + value: cdktf.numberToHclTerraform(this._tokenMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_no_default_policy: { + value: cdktf.booleanToHclTerraform(this._tokenNoDefaultPolicy), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + token_num_uses: { + value: cdktf.numberToHclTerraform(this._tokenNumUses), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_period: { + value: cdktf.numberToHclTerraform(this._tokenPeriod), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenPolicies), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_ttl: { + value: cdktf.numberToHclTerraform(this._tokenTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_type: { + value: cdktf.stringToHclTerraform(this._tokenType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/azure-secret-backend-role/README.md b/src/azure-secret-backend-role/README.md index da0c8dab..14cc43c1 100644 --- a/src/azure-secret-backend-role/README.md +++ b/src/azure-secret-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_azure_secret_backend_role` -Refer to the Terraform Registory for docs: [`vault_azure_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/azure_secret_backend_role). +Refer to the Terraform Registry for docs: [`vault_azure_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/azure_secret_backend_role). diff --git a/src/azure-secret-backend-role/index.ts b/src/azure-secret-backend-role/index.ts index eb47452d..f295f4f5 100644 --- a/src/azure-secret-backend-role/index.ts +++ b/src/azure-secret-backend-role/index.ts @@ -97,6 +97,25 @@ export function azureSecretBackendRoleAzureGroupsToTerraform(struct?: AzureSecre } } + +export function azureSecretBackendRoleAzureGroupsToHclTerraform(struct?: AzureSecretBackendRoleAzureGroups | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + group_name: { + value: cdktf.stringToHclTerraform(struct!.groupName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class AzureSecretBackendRoleAzureGroupsOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -206,6 +225,37 @@ export function azureSecretBackendRoleAzureRolesToTerraform(struct?: AzureSecret } } + +export function azureSecretBackendRoleAzureRolesToHclTerraform(struct?: AzureSecretBackendRoleAzureRoles | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + role_id: { + value: cdktf.stringToHclTerraform(struct!.roleId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role_name: { + value: cdktf.stringToHclTerraform(struct!.roleName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + scope: { + value: cdktf.stringToHclTerraform(struct!.scope), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class AzureSecretBackendRoleAzureRolesOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -588,4 +638,78 @@ export class AzureSecretBackendRole extends cdktf.TerraformResource { azure_roles: cdktf.listMapper(azureSecretBackendRoleAzureRolesToTerraform, true)(this._azureRoles.internalValue), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + application_object_id: { + value: cdktf.stringToHclTerraform(this._applicationObjectId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + description: { + value: cdktf.stringToHclTerraform(this._description), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_ttl: { + value: cdktf.stringToHclTerraform(this._maxTtl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + permanently_delete: { + value: cdktf.booleanToHclTerraform(this._permanentlyDelete), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + role: { + value: cdktf.stringToHclTerraform(this._role), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ttl: { + value: cdktf.stringToHclTerraform(this._ttl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + azure_groups: { + value: cdktf.listMapperHcl(azureSecretBackendRoleAzureGroupsToHclTerraform, true)(this._azureGroups.internalValue), + isBlock: true, + type: "set", + storageClassType: "AzureSecretBackendRoleAzureGroupsList", + }, + azure_roles: { + value: cdktf.listMapperHcl(azureSecretBackendRoleAzureRolesToHclTerraform, true)(this._azureRoles.internalValue), + isBlock: true, + type: "set", + storageClassType: "AzureSecretBackendRoleAzureRolesList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/azure-secret-backend/README.md b/src/azure-secret-backend/README.md index fc592b3d..41ad2ec1 100644 --- a/src/azure-secret-backend/README.md +++ b/src/azure-secret-backend/README.md @@ -1,3 +1,3 @@ # `vault_azure_secret_backend` -Refer to the Terraform Registory for docs: [`vault_azure_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/azure_secret_backend). +Refer to the Terraform Registry for docs: [`vault_azure_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/azure_secret_backend). diff --git a/src/azure-secret-backend/index.ts b/src/azure-secret-backend/index.ts index 1d5c43b1..a6a9381b 100644 --- a/src/azure-secret-backend/index.ts +++ b/src/azure-secret-backend/index.ts @@ -338,4 +338,78 @@ export class AzureSecretBackend extends cdktf.TerraformResource { use_microsoft_graph_api: cdktf.booleanToTerraform(this._useMicrosoftGraphApi), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + client_id: { + value: cdktf.stringToHclTerraform(this._clientId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + client_secret: { + value: cdktf.stringToHclTerraform(this._clientSecret), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + description: { + value: cdktf.stringToHclTerraform(this._description), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disable_remount: { + value: cdktf.booleanToHclTerraform(this._disableRemount), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + environment: { + value: cdktf.stringToHclTerraform(this._environment), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + subscription_id: { + value: cdktf.stringToHclTerraform(this._subscriptionId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + tenant_id: { + value: cdktf.stringToHclTerraform(this._tenantId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + use_microsoft_graph_api: { + value: cdktf.booleanToHclTerraform(this._useMicrosoftGraphApi), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/cert-auth-backend-role/README.md b/src/cert-auth-backend-role/README.md index 02550c4d..991ee974 100644 --- a/src/cert-auth-backend-role/README.md +++ b/src/cert-auth-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_cert_auth_backend_role` -Refer to the Terraform Registory for docs: [`vault_cert_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/cert_auth_backend_role). +Refer to the Terraform Registry for docs: [`vault_cert_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/cert_auth_backend_role). diff --git a/src/cert-auth-backend-role/index.ts b/src/cert-auth-backend-role/index.ts index 32bb30cb..0cedf62d 100644 --- a/src/cert-auth-backend-role/index.ts +++ b/src/cert-auth-backend-role/index.ts @@ -722,4 +722,180 @@ export class CertAuthBackendRole extends cdktf.TerraformResource { token_type: cdktf.stringToTerraform(this._tokenType), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + allowed_common_names: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._allowedCommonNames), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + allowed_dns_sans: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._allowedDnsSans), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + allowed_email_sans: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._allowedEmailSans), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + allowed_names: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._allowedNames), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + allowed_organization_units: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._allowedOrganizationUnits), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + allowed_organizational_units: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._allowedOrganizationalUnits), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + allowed_uri_sans: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._allowedUriSans), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + certificate: { + value: cdktf.stringToHclTerraform(this._certificate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + display_name: { + value: cdktf.stringToHclTerraform(this._displayName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ocsp_ca_certificates: { + value: cdktf.stringToHclTerraform(this._ocspCaCertificates), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ocsp_enabled: { + value: cdktf.booleanToHclTerraform(this._ocspEnabled), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + ocsp_fail_open: { + value: cdktf.booleanToHclTerraform(this._ocspFailOpen), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + ocsp_query_all_servers: { + value: cdktf.booleanToHclTerraform(this._ocspQueryAllServers), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + ocsp_servers_override: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._ocspServersOverride), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + required_extensions: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._requiredExtensions), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_bound_cidrs: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenBoundCidrs), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_explicit_max_ttl: { + value: cdktf.numberToHclTerraform(this._tokenExplicitMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_max_ttl: { + value: cdktf.numberToHclTerraform(this._tokenMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_no_default_policy: { + value: cdktf.booleanToHclTerraform(this._tokenNoDefaultPolicy), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + token_num_uses: { + value: cdktf.numberToHclTerraform(this._tokenNumUses), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_period: { + value: cdktf.numberToHclTerraform(this._tokenPeriod), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenPolicies), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_ttl: { + value: cdktf.numberToHclTerraform(this._tokenTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_type: { + value: cdktf.stringToHclTerraform(this._tokenType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/consul-secret-backend-role/README.md b/src/consul-secret-backend-role/README.md index df19fcad..3c420822 100644 --- a/src/consul-secret-backend-role/README.md +++ b/src/consul-secret-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_consul_secret_backend_role` -Refer to the Terraform Registory for docs: [`vault_consul_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/consul_secret_backend_role). +Refer to the Terraform Registry for docs: [`vault_consul_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/consul_secret_backend_role). diff --git a/src/consul-secret-backend-role/index.ts b/src/consul-secret-backend-role/index.ts index 3f5b1a55..ca09f1ff 100644 --- a/src/consul-secret-backend-role/index.ts +++ b/src/consul-secret-backend-role/index.ts @@ -439,4 +439,102 @@ export class ConsulSecretBackendRole extends cdktf.TerraformResource { ttl: cdktf.numberToTerraform(this._ttl), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + consul_namespace: { + value: cdktf.stringToHclTerraform(this._consulNamespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + consul_policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._consulPolicies), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + consul_roles: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._consulRoles), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + local: { + value: cdktf.booleanToHclTerraform(this._local), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + max_ttl: { + value: cdktf.numberToHclTerraform(this._maxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + node_identities: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._nodeIdentities), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + partition: { + value: cdktf.stringToHclTerraform(this._partition), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._policies), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + service_identities: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._serviceIdentities), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_type: { + value: cdktf.stringToHclTerraform(this._tokenType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ttl: { + value: cdktf.numberToHclTerraform(this._ttl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/consul-secret-backend/README.md b/src/consul-secret-backend/README.md index 4e7163e6..b3a6f49d 100644 --- a/src/consul-secret-backend/README.md +++ b/src/consul-secret-backend/README.md @@ -1,3 +1,3 @@ # `vault_consul_secret_backend` -Refer to the Terraform Registory for docs: [`vault_consul_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/consul_secret_backend). +Refer to the Terraform Registry for docs: [`vault_consul_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/consul_secret_backend). diff --git a/src/consul-secret-backend/index.ts b/src/consul-secret-backend/index.ts index 5b6573d8..85c54cd1 100644 --- a/src/consul-secret-backend/index.ts +++ b/src/consul-secret-backend/index.ts @@ -437,4 +437,102 @@ export class ConsulSecretBackend extends cdktf.TerraformResource { token: cdktf.stringToTerraform(this._token), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + address: { + value: cdktf.stringToHclTerraform(this._address), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + bootstrap: { + value: cdktf.booleanToHclTerraform(this._bootstrap), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + ca_cert: { + value: cdktf.stringToHclTerraform(this._caCert), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + client_cert: { + value: cdktf.stringToHclTerraform(this._clientCert), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + client_key: { + value: cdktf.stringToHclTerraform(this._clientKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + default_lease_ttl_seconds: { + value: cdktf.numberToHclTerraform(this._defaultLeaseTtlSeconds), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + description: { + value: cdktf.stringToHclTerraform(this._description), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disable_remount: { + value: cdktf.booleanToHclTerraform(this._disableRemount), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + local: { + value: cdktf.booleanToHclTerraform(this._local), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + max_lease_ttl_seconds: { + value: cdktf.numberToHclTerraform(this._maxLeaseTtlSeconds), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + scheme: { + value: cdktf.stringToHclTerraform(this._scheme), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + token: { + value: cdktf.stringToHclTerraform(this._token), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-ad-access-credentials/README.md b/src/data-vault-ad-access-credentials/README.md index 45c84281..dec096de 100644 --- a/src/data-vault-ad-access-credentials/README.md +++ b/src/data-vault-ad-access-credentials/README.md @@ -1,3 +1,3 @@ # `data_vault_ad_access_credentials` -Refer to the Terraform Registory for docs: [`data_vault_ad_access_credentials`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/ad_access_credentials). +Refer to the Terraform Registry for docs: [`data_vault_ad_access_credentials`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/ad_access_credentials). diff --git a/src/data-vault-ad-access-credentials/index.ts b/src/data-vault-ad-access-credentials/index.ts index 4dfbcb9d..89a3eb9b 100644 --- a/src/data-vault-ad-access-credentials/index.ts +++ b/src/data-vault-ad-access-credentials/index.ts @@ -185,4 +185,36 @@ export class DataVaultAdAccessCredentials extends cdktf.TerraformDataSource { role: cdktf.stringToTerraform(this._role), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role: { + value: cdktf.stringToHclTerraform(this._role), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-approle-auth-backend-role-id/README.md b/src/data-vault-approle-auth-backend-role-id/README.md index aa87741b..5bf39f2c 100644 --- a/src/data-vault-approle-auth-backend-role-id/README.md +++ b/src/data-vault-approle-auth-backend-role-id/README.md @@ -1,3 +1,3 @@ # `data_vault_approle_auth_backend_role_id` -Refer to the Terraform Registory for docs: [`data_vault_approle_auth_backend_role_id`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/approle_auth_backend_role_id). +Refer to the Terraform Registry for docs: [`data_vault_approle_auth_backend_role_id`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/approle_auth_backend_role_id). diff --git a/src/data-vault-approle-auth-backend-role-id/index.ts b/src/data-vault-approle-auth-backend-role-id/index.ts index fa387769..507297f0 100644 --- a/src/data-vault-approle-auth-backend-role-id/index.ts +++ b/src/data-vault-approle-auth-backend-role-id/index.ts @@ -178,4 +178,36 @@ export class DataVaultApproleAuthBackendRoleId extends cdktf.TerraformDataSource role_name: cdktf.stringToTerraform(this._roleName), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role_name: { + value: cdktf.stringToHclTerraform(this._roleName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-auth-backend/README.md b/src/data-vault-auth-backend/README.md index b800d895..65e6b50e 100644 --- a/src/data-vault-auth-backend/README.md +++ b/src/data-vault-auth-backend/README.md @@ -1,3 +1,3 @@ # `data_vault_auth_backend` -Refer to the Terraform Registory for docs: [`data_vault_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/auth_backend). +Refer to the Terraform Registry for docs: [`data_vault_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/auth_backend). diff --git a/src/data-vault-auth-backend/index.ts b/src/data-vault-auth-backend/index.ts index f2488583..b9acd06a 100644 --- a/src/data-vault-auth-backend/index.ts +++ b/src/data-vault-auth-backend/index.ts @@ -184,4 +184,30 @@ export class DataVaultAuthBackend extends cdktf.TerraformDataSource { path: cdktf.stringToTerraform(this._path), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-auth-backends/README.md b/src/data-vault-auth-backends/README.md index 49150abd..5e6cc5e8 100644 --- a/src/data-vault-auth-backends/README.md +++ b/src/data-vault-auth-backends/README.md @@ -1,3 +1,3 @@ # `data_vault_auth_backends` -Refer to the Terraform Registory for docs: [`data_vault_auth_backends`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/auth_backends). +Refer to the Terraform Registry for docs: [`data_vault_auth_backends`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/auth_backends). diff --git a/src/data-vault-auth-backends/index.ts b/src/data-vault-auth-backends/index.ts index 809f05ea..01e7e8a9 100644 --- a/src/data-vault-auth-backends/index.ts +++ b/src/data-vault-auth-backends/index.ts @@ -162,4 +162,30 @@ export class DataVaultAuthBackends extends cdktf.TerraformDataSource { type: cdktf.stringToTerraform(this._type), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + type: { + value: cdktf.stringToHclTerraform(this._type), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-aws-access-credentials/README.md b/src/data-vault-aws-access-credentials/README.md index 6368cc00..be775fb7 100644 --- a/src/data-vault-aws-access-credentials/README.md +++ b/src/data-vault-aws-access-credentials/README.md @@ -1,3 +1,3 @@ # `data_vault_aws_access_credentials` -Refer to the Terraform Registory for docs: [`data_vault_aws_access_credentials`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/aws_access_credentials). +Refer to the Terraform Registry for docs: [`data_vault_aws_access_credentials`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/aws_access_credentials). diff --git a/src/data-vault-aws-access-credentials/index.ts b/src/data-vault-aws-access-credentials/index.ts index e1b4d4bf..da08dc5e 100644 --- a/src/data-vault-aws-access-credentials/index.ts +++ b/src/data-vault-aws-access-credentials/index.ts @@ -301,4 +301,60 @@ export class DataVaultAwsAccessCredentials extends cdktf.TerraformDataSource { type: cdktf.stringToTerraform(this._type), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + region: { + value: cdktf.stringToHclTerraform(this._region), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role: { + value: cdktf.stringToHclTerraform(this._role), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role_arn: { + value: cdktf.stringToHclTerraform(this._roleArn), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ttl: { + value: cdktf.stringToHclTerraform(this._ttl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + type: { + value: cdktf.stringToHclTerraform(this._type), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-aws-static-access-credentials/README.md b/src/data-vault-aws-static-access-credentials/README.md index 0cbfac39..0fe75079 100644 --- a/src/data-vault-aws-static-access-credentials/README.md +++ b/src/data-vault-aws-static-access-credentials/README.md @@ -1,3 +1,3 @@ # `data_vault_aws_static_access_credentials` -Refer to the Terraform Registory for docs: [`data_vault_aws_static_access_credentials`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/aws_static_access_credentials). +Refer to the Terraform Registry for docs: [`data_vault_aws_static_access_credentials`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/aws_static_access_credentials). diff --git a/src/data-vault-aws-static-access-credentials/index.ts b/src/data-vault-aws-static-access-credentials/index.ts index 794b3347..01c6ffcf 100644 --- a/src/data-vault-aws-static-access-credentials/index.ts +++ b/src/data-vault-aws-static-access-credentials/index.ts @@ -180,4 +180,36 @@ export class DataVaultAwsStaticAccessCredentials extends cdktf.TerraformDataSour namespace: cdktf.stringToTerraform(this._namespace), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-azure-access-credentials/README.md b/src/data-vault-azure-access-credentials/README.md index 532f14e4..b1caf590 100644 --- a/src/data-vault-azure-access-credentials/README.md +++ b/src/data-vault-azure-access-credentials/README.md @@ -1,3 +1,3 @@ # `data_vault_azure_access_credentials` -Refer to the Terraform Registory for docs: [`data_vault_azure_access_credentials`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/azure_access_credentials). +Refer to the Terraform Registry for docs: [`data_vault_azure_access_credentials`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/azure_access_credentials). diff --git a/src/data-vault-azure-access-credentials/index.ts b/src/data-vault-azure-access-credentials/index.ts index 16a512b4..aeaaffab 100644 --- a/src/data-vault-azure-access-credentials/index.ts +++ b/src/data-vault-azure-access-credentials/index.ts @@ -370,4 +370,78 @@ export class DataVaultAzureAccessCredentials extends cdktf.TerraformDataSource { validate_creds: cdktf.booleanToTerraform(this._validateCreds), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + environment: { + value: cdktf.stringToHclTerraform(this._environment), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_cred_validation_seconds: { + value: cdktf.numberToHclTerraform(this._maxCredValidationSeconds), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + num_seconds_between_tests: { + value: cdktf.numberToHclTerraform(this._numSecondsBetweenTests), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + num_sequential_successes: { + value: cdktf.numberToHclTerraform(this._numSequentialSuccesses), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + role: { + value: cdktf.stringToHclTerraform(this._role), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + subscription_id: { + value: cdktf.stringToHclTerraform(this._subscriptionId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + tenant_id: { + value: cdktf.stringToHclTerraform(this._tenantId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + validate_creds: { + value: cdktf.booleanToHclTerraform(this._validateCreds), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-gcp-auth-backend-role/README.md b/src/data-vault-gcp-auth-backend-role/README.md index 8cf311c5..d32cfa07 100644 --- a/src/data-vault-gcp-auth-backend-role/README.md +++ b/src/data-vault-gcp-auth-backend-role/README.md @@ -1,3 +1,3 @@ # `data_vault_gcp_auth_backend_role` -Refer to the Terraform Registory for docs: [`data_vault_gcp_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/gcp_auth_backend_role). +Refer to the Terraform Registry for docs: [`data_vault_gcp_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/gcp_auth_backend_role). diff --git a/src/data-vault-gcp-auth-backend-role/index.ts b/src/data-vault-gcp-auth-backend-role/index.ts index fc1a3628..cb93319d 100644 --- a/src/data-vault-gcp-auth-backend-role/index.ts +++ b/src/data-vault-gcp-auth-backend-role/index.ts @@ -429,4 +429,90 @@ export class DataVaultGcpAuthBackendRole extends cdktf.TerraformDataSource { token_type: cdktf.stringToTerraform(this._tokenType), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role_name: { + value: cdktf.stringToHclTerraform(this._roleName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + token_bound_cidrs: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenBoundCidrs), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_explicit_max_ttl: { + value: cdktf.numberToHclTerraform(this._tokenExplicitMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_max_ttl: { + value: cdktf.numberToHclTerraform(this._tokenMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_no_default_policy: { + value: cdktf.booleanToHclTerraform(this._tokenNoDefaultPolicy), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + token_num_uses: { + value: cdktf.numberToHclTerraform(this._tokenNumUses), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_period: { + value: cdktf.numberToHclTerraform(this._tokenPeriod), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenPolicies), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_ttl: { + value: cdktf.numberToHclTerraform(this._tokenTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_type: { + value: cdktf.stringToHclTerraform(this._tokenType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-generic-secret/README.md b/src/data-vault-generic-secret/README.md index 9ea849f2..6d72cad4 100644 --- a/src/data-vault-generic-secret/README.md +++ b/src/data-vault-generic-secret/README.md @@ -1,3 +1,3 @@ # `data_vault_generic_secret` -Refer to the Terraform Registory for docs: [`data_vault_generic_secret`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/generic_secret). +Refer to the Terraform Registry for docs: [`data_vault_generic_secret`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/generic_secret). diff --git a/src/data-vault-generic-secret/index.ts b/src/data-vault-generic-secret/index.ts index 3a6212bc..0cef40b9 100644 --- a/src/data-vault-generic-secret/index.ts +++ b/src/data-vault-generic-secret/index.ts @@ -226,4 +226,42 @@ export class DataVaultGenericSecret extends cdktf.TerraformDataSource { with_lease_start_time: cdktf.booleanToTerraform(this._withLeaseStartTime), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + version: { + value: cdktf.numberToHclTerraform(this._version), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + with_lease_start_time: { + value: cdktf.booleanToHclTerraform(this._withLeaseStartTime), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-identity-entity/README.md b/src/data-vault-identity-entity/README.md index a2fff4b0..ec53a095 100644 --- a/src/data-vault-identity-entity/README.md +++ b/src/data-vault-identity-entity/README.md @@ -1,3 +1,3 @@ # `data_vault_identity_entity` -Refer to the Terraform Registory for docs: [`data_vault_identity_entity`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/identity_entity). +Refer to the Terraform Registry for docs: [`data_vault_identity_entity`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/identity_entity). diff --git a/src/data-vault-identity-entity/index.ts b/src/data-vault-identity-entity/index.ts index 5ac8c900..5c349450 100644 --- a/src/data-vault-identity-entity/index.ts +++ b/src/data-vault-identity-entity/index.ts @@ -68,6 +68,17 @@ export function dataVaultIdentityEntityAliasesToTerraform(struct?: DataVaultIden } } + +export function dataVaultIdentityEntityAliasesToHclTerraform(struct?: DataVaultIdentityEntityAliases): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + }; + return attrs; +} + export class DataVaultIdentityEntityAliasesOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; @@ -420,4 +431,54 @@ export class DataVaultIdentityEntity extends cdktf.TerraformDataSource { namespace: cdktf.stringToTerraform(this._namespace), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + alias_id: { + value: cdktf.stringToHclTerraform(this._aliasId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + alias_mount_accessor: { + value: cdktf.stringToHclTerraform(this._aliasMountAccessor), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + alias_name: { + value: cdktf.stringToHclTerraform(this._aliasName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + entity_id: { + value: cdktf.stringToHclTerraform(this._entityId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + entity_name: { + value: cdktf.stringToHclTerraform(this._entityName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-identity-group/README.md b/src/data-vault-identity-group/README.md index 61bdf2da..cbd6ab1c 100644 --- a/src/data-vault-identity-group/README.md +++ b/src/data-vault-identity-group/README.md @@ -1,3 +1,3 @@ # `data_vault_identity_group` -Refer to the Terraform Registory for docs: [`data_vault_identity_group`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/identity_group). +Refer to the Terraform Registry for docs: [`data_vault_identity_group`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/identity_group). diff --git a/src/data-vault-identity-group/index.ts b/src/data-vault-identity-group/index.ts index d8f35fe7..17091f14 100644 --- a/src/data-vault-identity-group/index.ts +++ b/src/data-vault-identity-group/index.ts @@ -340,4 +340,54 @@ export class DataVaultIdentityGroup extends cdktf.TerraformDataSource { namespace: cdktf.stringToTerraform(this._namespace), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + alias_id: { + value: cdktf.stringToHclTerraform(this._aliasId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + alias_mount_accessor: { + value: cdktf.stringToHclTerraform(this._aliasMountAccessor), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + alias_name: { + value: cdktf.stringToHclTerraform(this._aliasName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + group_id: { + value: cdktf.stringToHclTerraform(this._groupId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + group_name: { + value: cdktf.stringToHclTerraform(this._groupName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-identity-oidc-client-creds/README.md b/src/data-vault-identity-oidc-client-creds/README.md index 9d4218d5..bfd66dee 100644 --- a/src/data-vault-identity-oidc-client-creds/README.md +++ b/src/data-vault-identity-oidc-client-creds/README.md @@ -1,3 +1,3 @@ # `data_vault_identity_oidc_client_creds` -Refer to the Terraform Registory for docs: [`data_vault_identity_oidc_client_creds`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/identity_oidc_client_creds). +Refer to the Terraform Registry for docs: [`data_vault_identity_oidc_client_creds`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/identity_oidc_client_creds). diff --git a/src/data-vault-identity-oidc-client-creds/index.ts b/src/data-vault-identity-oidc-client-creds/index.ts index b4bd508b..a35bc928 100644 --- a/src/data-vault-identity-oidc-client-creds/index.ts +++ b/src/data-vault-identity-oidc-client-creds/index.ts @@ -159,4 +159,30 @@ export class DataVaultIdentityOidcClientCreds extends cdktf.TerraformDataSource namespace: cdktf.stringToTerraform(this._namespace), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-identity-oidc-openid-config/README.md b/src/data-vault-identity-oidc-openid-config/README.md index 0b087734..9d23150b 100644 --- a/src/data-vault-identity-oidc-openid-config/README.md +++ b/src/data-vault-identity-oidc-openid-config/README.md @@ -1,3 +1,3 @@ # `data_vault_identity_oidc_openid_config` -Refer to the Terraform Registory for docs: [`data_vault_identity_oidc_openid_config`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/identity_oidc_openid_config). +Refer to the Terraform Registry for docs: [`data_vault_identity_oidc_openid_config`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/identity_oidc_openid_config). diff --git a/src/data-vault-identity-oidc-openid-config/index.ts b/src/data-vault-identity-oidc-openid-config/index.ts index 8e390868..a9e54578 100644 --- a/src/data-vault-identity-oidc-openid-config/index.ts +++ b/src/data-vault-identity-oidc-openid-config/index.ts @@ -209,4 +209,30 @@ export class DataVaultIdentityOidcOpenidConfig extends cdktf.TerraformDataSource namespace: cdktf.stringToTerraform(this._namespace), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-identity-oidc-public-keys/README.md b/src/data-vault-identity-oidc-public-keys/README.md index c465d41e..d2c80334 100644 --- a/src/data-vault-identity-oidc-public-keys/README.md +++ b/src/data-vault-identity-oidc-public-keys/README.md @@ -1,3 +1,3 @@ # `data_vault_identity_oidc_public_keys` -Refer to the Terraform Registory for docs: [`data_vault_identity_oidc_public_keys`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/identity_oidc_public_keys). +Refer to the Terraform Registry for docs: [`data_vault_identity_oidc_public_keys`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/identity_oidc_public_keys). diff --git a/src/data-vault-identity-oidc-public-keys/index.ts b/src/data-vault-identity-oidc-public-keys/index.ts index 04269c61..1c658a73 100644 --- a/src/data-vault-identity-oidc-public-keys/index.ts +++ b/src/data-vault-identity-oidc-public-keys/index.ts @@ -155,4 +155,30 @@ export class DataVaultIdentityOidcPublicKeys extends cdktf.TerraformDataSource { namespace: cdktf.stringToTerraform(this._namespace), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-kubernetes-auth-backend-config/README.md b/src/data-vault-kubernetes-auth-backend-config/README.md index cefd18a4..cf2030b4 100644 --- a/src/data-vault-kubernetes-auth-backend-config/README.md +++ b/src/data-vault-kubernetes-auth-backend-config/README.md @@ -1,3 +1,3 @@ # `data_vault_kubernetes_auth_backend_config` -Refer to the Terraform Registory for docs: [`data_vault_kubernetes_auth_backend_config`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/kubernetes_auth_backend_config). +Refer to the Terraform Registry for docs: [`data_vault_kubernetes_auth_backend_config`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/kubernetes_auth_backend_config). diff --git a/src/data-vault-kubernetes-auth-backend-config/index.ts b/src/data-vault-kubernetes-auth-backend-config/index.ts index 97e58a92..79d76b38 100644 --- a/src/data-vault-kubernetes-auth-backend-config/index.ts +++ b/src/data-vault-kubernetes-auth-backend-config/index.ts @@ -296,4 +296,66 @@ export class DataVaultKubernetesAuthBackendConfig extends cdktf.TerraformDataSou pem_keys: cdktf.listMapper(cdktf.stringToTerraform, false)(this._pemKeys), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disable_iss_validation: { + value: cdktf.booleanToHclTerraform(this._disableIssValidation), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + disable_local_ca_jwt: { + value: cdktf.booleanToHclTerraform(this._disableLocalCaJwt), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + issuer: { + value: cdktf.stringToHclTerraform(this._issuer), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + kubernetes_ca_cert: { + value: cdktf.stringToHclTerraform(this._kubernetesCaCert), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + kubernetes_host: { + value: cdktf.stringToHclTerraform(this._kubernetesHost), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + pem_keys: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._pemKeys), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-kubernetes-auth-backend-role/README.md b/src/data-vault-kubernetes-auth-backend-role/README.md index fe5801c2..4795de0e 100644 --- a/src/data-vault-kubernetes-auth-backend-role/README.md +++ b/src/data-vault-kubernetes-auth-backend-role/README.md @@ -1,3 +1,3 @@ # `data_vault_kubernetes_auth_backend_role` -Refer to the Terraform Registory for docs: [`data_vault_kubernetes_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/kubernetes_auth_backend_role). +Refer to the Terraform Registry for docs: [`data_vault_kubernetes_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/kubernetes_auth_backend_role). diff --git a/src/data-vault-kubernetes-auth-backend-role/index.ts b/src/data-vault-kubernetes-auth-backend-role/index.ts index dc3eaf90..89ee1a56 100644 --- a/src/data-vault-kubernetes-auth-backend-role/index.ts +++ b/src/data-vault-kubernetes-auth-backend-role/index.ts @@ -428,4 +428,96 @@ export class DataVaultKubernetesAuthBackendRole extends cdktf.TerraformDataSourc token_type: cdktf.stringToTerraform(this._tokenType), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + audience: { + value: cdktf.stringToHclTerraform(this._audience), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role_name: { + value: cdktf.stringToHclTerraform(this._roleName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + token_bound_cidrs: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenBoundCidrs), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_explicit_max_ttl: { + value: cdktf.numberToHclTerraform(this._tokenExplicitMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_max_ttl: { + value: cdktf.numberToHclTerraform(this._tokenMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_no_default_policy: { + value: cdktf.booleanToHclTerraform(this._tokenNoDefaultPolicy), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + token_num_uses: { + value: cdktf.numberToHclTerraform(this._tokenNumUses), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_period: { + value: cdktf.numberToHclTerraform(this._tokenPeriod), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenPolicies), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_ttl: { + value: cdktf.numberToHclTerraform(this._tokenTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_type: { + value: cdktf.stringToHclTerraform(this._tokenType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-kubernetes-service-account-token/README.md b/src/data-vault-kubernetes-service-account-token/README.md index 0e6d5542..102171c8 100644 --- a/src/data-vault-kubernetes-service-account-token/README.md +++ b/src/data-vault-kubernetes-service-account-token/README.md @@ -1,3 +1,3 @@ # `data_vault_kubernetes_service_account_token` -Refer to the Terraform Registory for docs: [`data_vault_kubernetes_service_account_token`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/kubernetes_service_account_token). +Refer to the Terraform Registry for docs: [`data_vault_kubernetes_service_account_token`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/kubernetes_service_account_token). diff --git a/src/data-vault-kubernetes-service-account-token/index.ts b/src/data-vault-kubernetes-service-account-token/index.ts index edc99ed9..abbe811e 100644 --- a/src/data-vault-kubernetes-service-account-token/index.ts +++ b/src/data-vault-kubernetes-service-account-token/index.ts @@ -269,4 +269,54 @@ export class DataVaultKubernetesServiceAccountToken extends cdktf.TerraformDataS ttl: cdktf.stringToTerraform(this._ttl), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + cluster_role_binding: { + value: cdktf.booleanToHclTerraform(this._clusterRoleBinding), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + kubernetes_namespace: { + value: cdktf.stringToHclTerraform(this._kubernetesNamespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role: { + value: cdktf.stringToHclTerraform(this._role), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ttl: { + value: cdktf.stringToHclTerraform(this._ttl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-kv-secret-subkeys-v2/README.md b/src/data-vault-kv-secret-subkeys-v2/README.md index a0e4ee73..1b3912dc 100644 --- a/src/data-vault-kv-secret-subkeys-v2/README.md +++ b/src/data-vault-kv-secret-subkeys-v2/README.md @@ -1,3 +1,3 @@ # `data_vault_kv_secret_subkeys_v2` -Refer to the Terraform Registory for docs: [`data_vault_kv_secret_subkeys_v2`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/kv_secret_subkeys_v2). +Refer to the Terraform Registry for docs: [`data_vault_kv_secret_subkeys_v2`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/kv_secret_subkeys_v2). diff --git a/src/data-vault-kv-secret-subkeys-v2/index.ts b/src/data-vault-kv-secret-subkeys-v2/index.ts index 72855719..2f644f4b 100644 --- a/src/data-vault-kv-secret-subkeys-v2/index.ts +++ b/src/data-vault-kv-secret-subkeys-v2/index.ts @@ -234,4 +234,48 @@ export class DataVaultKvSecretSubkeysV2 extends cdktf.TerraformDataSource { version: cdktf.numberToTerraform(this._version), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + depth: { + value: cdktf.numberToHclTerraform(this._depth), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + mount: { + value: cdktf.stringToHclTerraform(this._mount), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + version: { + value: cdktf.numberToHclTerraform(this._version), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-kv-secret-v2/README.md b/src/data-vault-kv-secret-v2/README.md index de16941d..93710411 100644 --- a/src/data-vault-kv-secret-v2/README.md +++ b/src/data-vault-kv-secret-v2/README.md @@ -1,3 +1,3 @@ # `data_vault_kv_secret_v2` -Refer to the Terraform Registory for docs: [`data_vault_kv_secret_v2`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/kv_secret_v2). +Refer to the Terraform Registry for docs: [`data_vault_kv_secret_v2`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/kv_secret_v2). diff --git a/src/data-vault-kv-secret-v2/index.ts b/src/data-vault-kv-secret-v2/index.ts index 49126d09..8244e1bb 100644 --- a/src/data-vault-kv-secret-v2/index.ts +++ b/src/data-vault-kv-secret-v2/index.ts @@ -231,4 +231,42 @@ export class DataVaultKvSecretV2 extends cdktf.TerraformDataSource { version: cdktf.numberToTerraform(this._version), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + mount: { + value: cdktf.stringToHclTerraform(this._mount), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + version: { + value: cdktf.numberToHclTerraform(this._version), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-kv-secret/README.md b/src/data-vault-kv-secret/README.md index 71fd8679..4fc399c1 100644 --- a/src/data-vault-kv-secret/README.md +++ b/src/data-vault-kv-secret/README.md @@ -1,3 +1,3 @@ # `data_vault_kv_secret` -Refer to the Terraform Registory for docs: [`data_vault_kv_secret`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/kv_secret). +Refer to the Terraform Registry for docs: [`data_vault_kv_secret`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/kv_secret). diff --git a/src/data-vault-kv-secret/index.ts b/src/data-vault-kv-secret/index.ts index 95e4b536..91f6a721 100644 --- a/src/data-vault-kv-secret/index.ts +++ b/src/data-vault-kv-secret/index.ts @@ -175,4 +175,30 @@ export class DataVaultKvSecret extends cdktf.TerraformDataSource { path: cdktf.stringToTerraform(this._path), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-kv-secrets-list-v2/README.md b/src/data-vault-kv-secrets-list-v2/README.md index 5eab4eca..1810ac2a 100644 --- a/src/data-vault-kv-secrets-list-v2/README.md +++ b/src/data-vault-kv-secrets-list-v2/README.md @@ -1,3 +1,3 @@ # `data_vault_kv_secrets_list_v2` -Refer to the Terraform Registory for docs: [`data_vault_kv_secrets_list_v2`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/kv_secrets_list_v2). +Refer to the Terraform Registry for docs: [`data_vault_kv_secrets_list_v2`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/kv_secrets_list_v2). diff --git a/src/data-vault-kv-secrets-list-v2/index.ts b/src/data-vault-kv-secrets-list-v2/index.ts index 2380dfa5..e68dbc8f 100644 --- a/src/data-vault-kv-secrets-list-v2/index.ts +++ b/src/data-vault-kv-secrets-list-v2/index.ts @@ -183,4 +183,36 @@ export class DataVaultKvSecretsListV2 extends cdktf.TerraformDataSource { namespace: cdktf.stringToTerraform(this._namespace), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + mount: { + value: cdktf.stringToHclTerraform(this._mount), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-kv-secrets-list/README.md b/src/data-vault-kv-secrets-list/README.md index da9d45e5..6afefbe3 100644 --- a/src/data-vault-kv-secrets-list/README.md +++ b/src/data-vault-kv-secrets-list/README.md @@ -1,3 +1,3 @@ # `data_vault_kv_secrets_list` -Refer to the Terraform Registory for docs: [`data_vault_kv_secrets_list`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/kv_secrets_list). +Refer to the Terraform Registry for docs: [`data_vault_kv_secrets_list`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/kv_secrets_list). diff --git a/src/data-vault-kv-secrets-list/index.ts b/src/data-vault-kv-secrets-list/index.ts index 1e577eb2..91b21a87 100644 --- a/src/data-vault-kv-secrets-list/index.ts +++ b/src/data-vault-kv-secrets-list/index.ts @@ -154,4 +154,30 @@ export class DataVaultKvSecretsList extends cdktf.TerraformDataSource { path: cdktf.stringToTerraform(this._path), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-ldap-dynamic-credentials/README.md b/src/data-vault-ldap-dynamic-credentials/README.md index 6207e56c..41ded932 100644 --- a/src/data-vault-ldap-dynamic-credentials/README.md +++ b/src/data-vault-ldap-dynamic-credentials/README.md @@ -1,3 +1,3 @@ # `data_vault_ldap_dynamic_credentials` -Refer to the Terraform Registory for docs: [`data_vault_ldap_dynamic_credentials`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/ldap_dynamic_credentials). +Refer to the Terraform Registry for docs: [`data_vault_ldap_dynamic_credentials`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/ldap_dynamic_credentials). diff --git a/src/data-vault-ldap-dynamic-credentials/index.ts b/src/data-vault-ldap-dynamic-credentials/index.ts index 01a5394e..d7f5a018 100644 --- a/src/data-vault-ldap-dynamic-credentials/index.ts +++ b/src/data-vault-ldap-dynamic-credentials/index.ts @@ -200,4 +200,36 @@ export class DataVaultLdapDynamicCredentials extends cdktf.TerraformDataSource { role_name: cdktf.stringToTerraform(this._roleName), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + mount: { + value: cdktf.stringToHclTerraform(this._mount), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role_name: { + value: cdktf.stringToHclTerraform(this._roleName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-ldap-static-credentials/README.md b/src/data-vault-ldap-static-credentials/README.md index 496bef26..5b3c8b48 100644 --- a/src/data-vault-ldap-static-credentials/README.md +++ b/src/data-vault-ldap-static-credentials/README.md @@ -1,3 +1,3 @@ # `data_vault_ldap_static_credentials` -Refer to the Terraform Registory for docs: [`data_vault_ldap_static_credentials`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/ldap_static_credentials). +Refer to the Terraform Registry for docs: [`data_vault_ldap_static_credentials`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/ldap_static_credentials). diff --git a/src/data-vault-ldap-static-credentials/index.ts b/src/data-vault-ldap-static-credentials/index.ts index 3a558100..186327ac 100644 --- a/src/data-vault-ldap-static-credentials/index.ts +++ b/src/data-vault-ldap-static-credentials/index.ts @@ -205,4 +205,36 @@ export class DataVaultLdapStaticCredentials extends cdktf.TerraformDataSource { role_name: cdktf.stringToTerraform(this._roleName), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + mount: { + value: cdktf.stringToHclTerraform(this._mount), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role_name: { + value: cdktf.stringToHclTerraform(this._roleName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-nomad-access-token/README.md b/src/data-vault-nomad-access-token/README.md index bedec893..a4a0c967 100644 --- a/src/data-vault-nomad-access-token/README.md +++ b/src/data-vault-nomad-access-token/README.md @@ -1,3 +1,3 @@ # `data_vault_nomad_access_token` -Refer to the Terraform Registory for docs: [`data_vault_nomad_access_token`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/nomad_access_token). +Refer to the Terraform Registry for docs: [`data_vault_nomad_access_token`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/nomad_access_token). diff --git a/src/data-vault-nomad-access-token/index.ts b/src/data-vault-nomad-access-token/index.ts index 5ab464ed..fcf175c1 100644 --- a/src/data-vault-nomad-access-token/index.ts +++ b/src/data-vault-nomad-access-token/index.ts @@ -180,4 +180,36 @@ export class DataVaultNomadAccessToken extends cdktf.TerraformDataSource { role: cdktf.stringToTerraform(this._role), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role: { + value: cdktf.stringToHclTerraform(this._role), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-pki-secret-backend-issuer/README.md b/src/data-vault-pki-secret-backend-issuer/README.md index d364d904..fe609300 100644 --- a/src/data-vault-pki-secret-backend-issuer/README.md +++ b/src/data-vault-pki-secret-backend-issuer/README.md @@ -1,3 +1,3 @@ # `data_vault_pki_secret_backend_issuer` -Refer to the Terraform Registory for docs: [`data_vault_pki_secret_backend_issuer`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/pki_secret_backend_issuer). +Refer to the Terraform Registry for docs: [`data_vault_pki_secret_backend_issuer`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/pki_secret_backend_issuer). diff --git a/src/data-vault-pki-secret-backend-issuer/index.ts b/src/data-vault-pki-secret-backend-issuer/index.ts index 3138174c..c687e447 100644 --- a/src/data-vault-pki-secret-backend-issuer/index.ts +++ b/src/data-vault-pki-secret-backend-issuer/index.ts @@ -210,4 +210,36 @@ export class DataVaultPkiSecretBackendIssuer extends cdktf.TerraformDataSource { namespace: cdktf.stringToTerraform(this._namespace), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + issuer_ref: { + value: cdktf.stringToHclTerraform(this._issuerRef), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-pki-secret-backend-issuers/README.md b/src/data-vault-pki-secret-backend-issuers/README.md index fe91f454..227163f9 100644 --- a/src/data-vault-pki-secret-backend-issuers/README.md +++ b/src/data-vault-pki-secret-backend-issuers/README.md @@ -1,3 +1,3 @@ # `data_vault_pki_secret_backend_issuers` -Refer to the Terraform Registory for docs: [`data_vault_pki_secret_backend_issuers`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/pki_secret_backend_issuers). +Refer to the Terraform Registry for docs: [`data_vault_pki_secret_backend_issuers`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/pki_secret_backend_issuers). diff --git a/src/data-vault-pki-secret-backend-issuers/index.ts b/src/data-vault-pki-secret-backend-issuers/index.ts index f85afcbd..3197e5a4 100644 --- a/src/data-vault-pki-secret-backend-issuers/index.ts +++ b/src/data-vault-pki-secret-backend-issuers/index.ts @@ -165,4 +165,30 @@ export class DataVaultPkiSecretBackendIssuers extends cdktf.TerraformDataSource namespace: cdktf.stringToTerraform(this._namespace), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-pki-secret-backend-key/README.md b/src/data-vault-pki-secret-backend-key/README.md index 02cc1795..f1bbd034 100644 --- a/src/data-vault-pki-secret-backend-key/README.md +++ b/src/data-vault-pki-secret-backend-key/README.md @@ -1,3 +1,3 @@ # `data_vault_pki_secret_backend_key` -Refer to the Terraform Registory for docs: [`data_vault_pki_secret_backend_key`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/pki_secret_backend_key). +Refer to the Terraform Registry for docs: [`data_vault_pki_secret_backend_key`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/pki_secret_backend_key). diff --git a/src/data-vault-pki-secret-backend-key/index.ts b/src/data-vault-pki-secret-backend-key/index.ts index fad21270..470695e4 100644 --- a/src/data-vault-pki-secret-backend-key/index.ts +++ b/src/data-vault-pki-secret-backend-key/index.ts @@ -185,4 +185,36 @@ export class DataVaultPkiSecretBackendKey extends cdktf.TerraformDataSource { namespace: cdktf.stringToTerraform(this._namespace), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key_ref: { + value: cdktf.stringToHclTerraform(this._keyRef), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-pki-secret-backend-keys/README.md b/src/data-vault-pki-secret-backend-keys/README.md index 1ac33a42..9e3ba311 100644 --- a/src/data-vault-pki-secret-backend-keys/README.md +++ b/src/data-vault-pki-secret-backend-keys/README.md @@ -1,3 +1,3 @@ # `data_vault_pki_secret_backend_keys` -Refer to the Terraform Registory for docs: [`data_vault_pki_secret_backend_keys`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/pki_secret_backend_keys). +Refer to the Terraform Registry for docs: [`data_vault_pki_secret_backend_keys`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/pki_secret_backend_keys). diff --git a/src/data-vault-pki-secret-backend-keys/index.ts b/src/data-vault-pki-secret-backend-keys/index.ts index 9c2c67ef..6345f83a 100644 --- a/src/data-vault-pki-secret-backend-keys/index.ts +++ b/src/data-vault-pki-secret-backend-keys/index.ts @@ -165,4 +165,30 @@ export class DataVaultPkiSecretBackendKeys extends cdktf.TerraformDataSource { namespace: cdktf.stringToTerraform(this._namespace), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-policy-document/README.md b/src/data-vault-policy-document/README.md index 36562c83..ea09df27 100644 --- a/src/data-vault-policy-document/README.md +++ b/src/data-vault-policy-document/README.md @@ -1,3 +1,3 @@ # `data_vault_policy_document` -Refer to the Terraform Registory for docs: [`data_vault_policy_document`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/policy_document). +Refer to the Terraform Registry for docs: [`data_vault_policy_document`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/policy_document). diff --git a/src/data-vault-policy-document/index.ts b/src/data-vault-policy-document/index.ts index 8e7f3335..a95bc8f5 100644 --- a/src/data-vault-policy-document/index.ts +++ b/src/data-vault-policy-document/index.ts @@ -54,6 +54,31 @@ export function dataVaultPolicyDocumentRuleAllowedParameterToTerraform(struct?: } } + +export function dataVaultPolicyDocumentRuleAllowedParameterToHclTerraform(struct?: DataVaultPolicyDocumentRuleAllowedParameter | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + key: { + value: cdktf.stringToHclTerraform(struct!.key), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + value: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.value), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DataVaultPolicyDocumentRuleAllowedParameterOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -172,6 +197,31 @@ export function dataVaultPolicyDocumentRuleDeniedParameterToTerraform(struct?: D } } + +export function dataVaultPolicyDocumentRuleDeniedParameterToHclTerraform(struct?: DataVaultPolicyDocumentRuleDeniedParameter | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + key: { + value: cdktf.stringToHclTerraform(struct!.key), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + value: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.value), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DataVaultPolicyDocumentRuleDeniedParameterOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -324,6 +374,67 @@ export function dataVaultPolicyDocumentRuleToTerraform(struct?: DataVaultPolicyD } } + +export function dataVaultPolicyDocumentRuleToHclTerraform(struct?: DataVaultPolicyDocumentRule | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + capabilities: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.capabilities), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + description: { + value: cdktf.stringToHclTerraform(struct!.description), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_wrapping_ttl: { + value: cdktf.stringToHclTerraform(struct!.maxWrappingTtl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + min_wrapping_ttl: { + value: cdktf.stringToHclTerraform(struct!.minWrappingTtl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(struct!.path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + required_parameters: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.requiredParameters), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + allowed_parameter: { + value: cdktf.listMapperHcl(dataVaultPolicyDocumentRuleAllowedParameterToHclTerraform, true)(struct!.allowedParameter), + isBlock: true, + type: "list", + storageClassType: "DataVaultPolicyDocumentRuleAllowedParameterList", + }, + denied_parameter: { + value: cdktf.listMapperHcl(dataVaultPolicyDocumentRuleDeniedParameterToHclTerraform, true)(struct!.deniedParameter), + isBlock: true, + type: "list", + storageClassType: "DataVaultPolicyDocumentRuleDeniedParameterList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DataVaultPolicyDocumentRuleOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -677,4 +788,30 @@ export class DataVaultPolicyDocument extends cdktf.TerraformDataSource { rule: cdktf.listMapper(dataVaultPolicyDocumentRuleToTerraform, true)(this._rule.internalValue), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + rule: { + value: cdktf.listMapperHcl(dataVaultPolicyDocumentRuleToHclTerraform, true)(this._rule.internalValue), + isBlock: true, + type: "list", + storageClassType: "DataVaultPolicyDocumentRuleList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-raft-autopilot-state/README.md b/src/data-vault-raft-autopilot-state/README.md index 2eed69c5..552b4d2c 100644 --- a/src/data-vault-raft-autopilot-state/README.md +++ b/src/data-vault-raft-autopilot-state/README.md @@ -1,3 +1,3 @@ # `data_vault_raft_autopilot_state` -Refer to the Terraform Registory for docs: [`data_vault_raft_autopilot_state`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/raft_autopilot_state). +Refer to the Terraform Registry for docs: [`data_vault_raft_autopilot_state`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/raft_autopilot_state). diff --git a/src/data-vault-raft-autopilot-state/index.ts b/src/data-vault-raft-autopilot-state/index.ts index c61bc27d..c203280f 100644 --- a/src/data-vault-raft-autopilot-state/index.ts +++ b/src/data-vault-raft-autopilot-state/index.ts @@ -186,4 +186,24 @@ export class DataVaultRaftAutopilotState extends cdktf.TerraformDataSource { namespace: cdktf.stringToTerraform(this._namespace), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-transform-decode/README.md b/src/data-vault-transform-decode/README.md index 9a566d78..40543843 100644 --- a/src/data-vault-transform-decode/README.md +++ b/src/data-vault-transform-decode/README.md @@ -1,3 +1,3 @@ # `data_vault_transform_decode` -Refer to the Terraform Registory for docs: [`data_vault_transform_decode`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/transform_decode). +Refer to the Terraform Registry for docs: [`data_vault_transform_decode`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/transform_decode). diff --git a/src/data-vault-transform-decode/index.ts b/src/data-vault-transform-decode/index.ts index aa71034e..73fecc16 100644 --- a/src/data-vault-transform-decode/index.ts +++ b/src/data-vault-transform-decode/index.ts @@ -314,4 +314,72 @@ export class DataVaultTransformDecode extends cdktf.TerraformDataSource { value: cdktf.stringToTerraform(this._value), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + batch_input: { + value: cdktf.listMapperHcl(cdktf.hashMapperHcl(cdktf.stringToHclTerraform), false)(this._batchInput), + isBlock: false, + type: "list", + storageClassType: "stringMapList", + }, + batch_results: { + value: cdktf.listMapperHcl(cdktf.hashMapperHcl(cdktf.stringToHclTerraform), false)(this._batchResults), + isBlock: false, + type: "list", + storageClassType: "stringMapList", + }, + decoded_value: { + value: cdktf.stringToHclTerraform(this._decodedValue), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role_name: { + value: cdktf.stringToHclTerraform(this._roleName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + transformation: { + value: cdktf.stringToHclTerraform(this._transformation), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + tweak: { + value: cdktf.stringToHclTerraform(this._tweak), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + value: { + value: cdktf.stringToHclTerraform(this._value), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-transform-encode/README.md b/src/data-vault-transform-encode/README.md index 13e25b3b..b2a4f70d 100644 --- a/src/data-vault-transform-encode/README.md +++ b/src/data-vault-transform-encode/README.md @@ -1,3 +1,3 @@ # `data_vault_transform_encode` -Refer to the Terraform Registory for docs: [`data_vault_transform_encode`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/transform_encode). +Refer to the Terraform Registry for docs: [`data_vault_transform_encode`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/transform_encode). diff --git a/src/data-vault-transform-encode/index.ts b/src/data-vault-transform-encode/index.ts index 6ad5a7f5..ed4a0ad2 100644 --- a/src/data-vault-transform-encode/index.ts +++ b/src/data-vault-transform-encode/index.ts @@ -314,4 +314,72 @@ export class DataVaultTransformEncode extends cdktf.TerraformDataSource { value: cdktf.stringToTerraform(this._value), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + batch_input: { + value: cdktf.listMapperHcl(cdktf.hashMapperHcl(cdktf.stringToHclTerraform), false)(this._batchInput), + isBlock: false, + type: "list", + storageClassType: "stringMapList", + }, + batch_results: { + value: cdktf.listMapperHcl(cdktf.hashMapperHcl(cdktf.stringToHclTerraform), false)(this._batchResults), + isBlock: false, + type: "list", + storageClassType: "stringMapList", + }, + encoded_value: { + value: cdktf.stringToHclTerraform(this._encodedValue), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role_name: { + value: cdktf.stringToHclTerraform(this._roleName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + transformation: { + value: cdktf.stringToHclTerraform(this._transformation), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + tweak: { + value: cdktf.stringToHclTerraform(this._tweak), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + value: { + value: cdktf.stringToHclTerraform(this._value), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-transit-decrypt/README.md b/src/data-vault-transit-decrypt/README.md index ea5f7b96..c2ac573f 100644 --- a/src/data-vault-transit-decrypt/README.md +++ b/src/data-vault-transit-decrypt/README.md @@ -1,3 +1,3 @@ # `data_vault_transit_decrypt` -Refer to the Terraform Registory for docs: [`data_vault_transit_decrypt`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/transit_decrypt). +Refer to the Terraform Registry for docs: [`data_vault_transit_decrypt`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/transit_decrypt). diff --git a/src/data-vault-transit-decrypt/index.ts b/src/data-vault-transit-decrypt/index.ts index 957a34d5..fa63c558 100644 --- a/src/data-vault-transit-decrypt/index.ts +++ b/src/data-vault-transit-decrypt/index.ts @@ -220,4 +220,48 @@ export class DataVaultTransitDecrypt extends cdktf.TerraformDataSource { namespace: cdktf.stringToTerraform(this._namespace), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ciphertext: { + value: cdktf.stringToHclTerraform(this._ciphertext), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + context: { + value: cdktf.stringToHclTerraform(this._context), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key: { + value: cdktf.stringToHclTerraform(this._key), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/data-vault-transit-encrypt/README.md b/src/data-vault-transit-encrypt/README.md index 55b1afe9..f7aea8ab 100644 --- a/src/data-vault-transit-encrypt/README.md +++ b/src/data-vault-transit-encrypt/README.md @@ -1,3 +1,3 @@ # `data_vault_transit_encrypt` -Refer to the Terraform Registory for docs: [`data_vault_transit_encrypt`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/transit_encrypt). +Refer to the Terraform Registry for docs: [`data_vault_transit_encrypt`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/data-sources/transit_encrypt). diff --git a/src/data-vault-transit-encrypt/index.ts b/src/data-vault-transit-encrypt/index.ts index 85d2dd5d..7c90d964 100644 --- a/src/data-vault-transit-encrypt/index.ts +++ b/src/data-vault-transit-encrypt/index.ts @@ -244,4 +244,54 @@ export class DataVaultTransitEncrypt extends cdktf.TerraformDataSource { plaintext: cdktf.stringToTerraform(this._plaintext), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + context: { + value: cdktf.stringToHclTerraform(this._context), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key: { + value: cdktf.stringToHclTerraform(this._key), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key_version: { + value: cdktf.numberToHclTerraform(this._keyVersion), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + plaintext: { + value: cdktf.stringToHclTerraform(this._plaintext), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/database-secret-backend-connection/README.md b/src/database-secret-backend-connection/README.md index a3b7dc19..4c7d527c 100644 --- a/src/database-secret-backend-connection/README.md +++ b/src/database-secret-backend-connection/README.md @@ -1,3 +1,3 @@ # `vault_database_secret_backend_connection` -Refer to the Terraform Registory for docs: [`vault_database_secret_backend_connection`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/database_secret_backend_connection). +Refer to the Terraform Registry for docs: [`vault_database_secret_backend_connection`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/database_secret_backend_connection). diff --git a/src/database-secret-backend-connection/index.ts b/src/database-secret-backend-connection/index.ts index 279f8543..1664ca9e 100644 --- a/src/database-secret-backend-connection/index.ts +++ b/src/database-secret-backend-connection/index.ts @@ -258,6 +258,79 @@ export function databaseSecretBackendConnectionCassandraToTerraform(struct?: Dat } } + +export function databaseSecretBackendConnectionCassandraToHclTerraform(struct?: DatabaseSecretBackendConnectionCassandraOutputReference | DatabaseSecretBackendConnectionCassandra): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + connect_timeout: { + value: cdktf.numberToHclTerraform(struct!.connectTimeout), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + hosts: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.hosts), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + insecure_tls: { + value: cdktf.booleanToHclTerraform(struct!.insecureTls), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + pem_bundle: { + value: cdktf.stringToHclTerraform(struct!.pemBundle), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + pem_json: { + value: cdktf.stringToHclTerraform(struct!.pemJson), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + port: { + value: cdktf.numberToHclTerraform(struct!.port), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + protocol_version: { + value: cdktf.numberToHclTerraform(struct!.protocolVersion), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + tls: { + value: cdktf.booleanToHclTerraform(struct!.tls), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretBackendConnectionCassandraOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; @@ -572,6 +645,67 @@ export function databaseSecretBackendConnectionCouchbaseToTerraform(struct?: Dat } } + +export function databaseSecretBackendConnectionCouchbaseToHclTerraform(struct?: DatabaseSecretBackendConnectionCouchbaseOutputReference | DatabaseSecretBackendConnectionCouchbase): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + base64_pem: { + value: cdktf.stringToHclTerraform(struct!.base64Pem), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + bucket_name: { + value: cdktf.stringToHclTerraform(struct!.bucketName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + hosts: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.hosts), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + insecure_tls: { + value: cdktf.booleanToHclTerraform(struct!.insecureTls), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + tls: { + value: cdktf.booleanToHclTerraform(struct!.tls), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_template: { + value: cdktf.stringToHclTerraform(struct!.usernameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretBackendConnectionCouchbaseOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; @@ -847,6 +981,79 @@ export function databaseSecretBackendConnectionElasticsearchToTerraform(struct?: } } + +export function databaseSecretBackendConnectionElasticsearchToHclTerraform(struct?: DatabaseSecretBackendConnectionElasticsearchOutputReference | DatabaseSecretBackendConnectionElasticsearch): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + ca_cert: { + value: cdktf.stringToHclTerraform(struct!.caCert), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ca_path: { + value: cdktf.stringToHclTerraform(struct!.caPath), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + client_cert: { + value: cdktf.stringToHclTerraform(struct!.clientCert), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + client_key: { + value: cdktf.stringToHclTerraform(struct!.clientKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + insecure: { + value: cdktf.booleanToHclTerraform(struct!.insecure), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + tls_server_name: { + value: cdktf.stringToHclTerraform(struct!.tlsServerName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + url: { + value: cdktf.stringToHclTerraform(struct!.url), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_template: { + value: cdktf.stringToHclTerraform(struct!.usernameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretBackendConnectionElasticsearchOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; @@ -1145,6 +1352,61 @@ export function databaseSecretBackendConnectionHanaToTerraform(struct?: Database } } + +export function databaseSecretBackendConnectionHanaToHclTerraform(struct?: DatabaseSecretBackendConnectionHanaOutputReference | DatabaseSecretBackendConnectionHana): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + connection_url: { + value: cdktf.stringToHclTerraform(struct!.connectionUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disable_escaping: { + value: cdktf.booleanToHclTerraform(struct!.disableEscaping), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + max_connection_lifetime: { + value: cdktf.numberToHclTerraform(struct!.maxConnectionLifetime), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_idle_connections: { + value: cdktf.numberToHclTerraform(struct!.maxIdleConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_open_connections: { + value: cdktf.numberToHclTerraform(struct!.maxOpenConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretBackendConnectionHanaOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; @@ -1407,6 +1669,79 @@ export function databaseSecretBackendConnectionInfluxdbToTerraform(struct?: Data } } + +export function databaseSecretBackendConnectionInfluxdbToHclTerraform(struct?: DatabaseSecretBackendConnectionInfluxdbOutputReference | DatabaseSecretBackendConnectionInfluxdb): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + connect_timeout: { + value: cdktf.numberToHclTerraform(struct!.connectTimeout), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + host: { + value: cdktf.stringToHclTerraform(struct!.host), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + insecure_tls: { + value: cdktf.booleanToHclTerraform(struct!.insecureTls), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + pem_bundle: { + value: cdktf.stringToHclTerraform(struct!.pemBundle), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + pem_json: { + value: cdktf.stringToHclTerraform(struct!.pemJson), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + port: { + value: cdktf.numberToHclTerraform(struct!.port), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + tls: { + value: cdktf.booleanToHclTerraform(struct!.tls), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_template: { + value: cdktf.stringToHclTerraform(struct!.usernameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretBackendConnectionInfluxdbOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; @@ -1705,6 +2040,61 @@ export function databaseSecretBackendConnectionMongodbToTerraform(struct?: Datab } } + +export function databaseSecretBackendConnectionMongodbToHclTerraform(struct?: DatabaseSecretBackendConnectionMongodbOutputReference | DatabaseSecretBackendConnectionMongodb): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + connection_url: { + value: cdktf.stringToHclTerraform(struct!.connectionUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_connection_lifetime: { + value: cdktf.numberToHclTerraform(struct!.maxConnectionLifetime), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_idle_connections: { + value: cdktf.numberToHclTerraform(struct!.maxIdleConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_open_connections: { + value: cdktf.numberToHclTerraform(struct!.maxOpenConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_template: { + value: cdktf.stringToHclTerraform(struct!.usernameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretBackendConnectionMongodbOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; @@ -1918,6 +2308,37 @@ export function databaseSecretBackendConnectionMongodbatlasToTerraform(struct?: } } + +export function databaseSecretBackendConnectionMongodbatlasToHclTerraform(struct?: DatabaseSecretBackendConnectionMongodbatlasOutputReference | DatabaseSecretBackendConnectionMongodbatlas): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + private_key: { + value: cdktf.stringToHclTerraform(struct!.privateKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + project_id: { + value: cdktf.stringToHclTerraform(struct!.projectId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + public_key: { + value: cdktf.stringToHclTerraform(struct!.publicKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretBackendConnectionMongodbatlasOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; @@ -2076,6 +2497,73 @@ export function databaseSecretBackendConnectionMssqlToTerraform(struct?: Databas } } + +export function databaseSecretBackendConnectionMssqlToHclTerraform(struct?: DatabaseSecretBackendConnectionMssqlOutputReference | DatabaseSecretBackendConnectionMssql): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + connection_url: { + value: cdktf.stringToHclTerraform(struct!.connectionUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + contained_db: { + value: cdktf.booleanToHclTerraform(struct!.containedDb), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + disable_escaping: { + value: cdktf.booleanToHclTerraform(struct!.disableEscaping), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + max_connection_lifetime: { + value: cdktf.numberToHclTerraform(struct!.maxConnectionLifetime), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_idle_connections: { + value: cdktf.numberToHclTerraform(struct!.maxIdleConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_open_connections: { + value: cdktf.numberToHclTerraform(struct!.maxOpenConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_template: { + value: cdktf.stringToHclTerraform(struct!.usernameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretBackendConnectionMssqlOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; @@ -2389,6 +2877,85 @@ export function databaseSecretBackendConnectionMysqlToTerraform(struct?: Databas } } + +export function databaseSecretBackendConnectionMysqlToHclTerraform(struct?: DatabaseSecretBackendConnectionMysqlOutputReference | DatabaseSecretBackendConnectionMysql): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + auth_type: { + value: cdktf.stringToHclTerraform(struct!.authType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + connection_url: { + value: cdktf.stringToHclTerraform(struct!.connectionUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_connection_lifetime: { + value: cdktf.numberToHclTerraform(struct!.maxConnectionLifetime), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_idle_connections: { + value: cdktf.numberToHclTerraform(struct!.maxIdleConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_open_connections: { + value: cdktf.numberToHclTerraform(struct!.maxOpenConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + service_account_json: { + value: cdktf.stringToHclTerraform(struct!.serviceAccountJson), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + tls_ca: { + value: cdktf.stringToHclTerraform(struct!.tlsCa), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + tls_certificate_key: { + value: cdktf.stringToHclTerraform(struct!.tlsCertificateKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_template: { + value: cdktf.stringToHclTerraform(struct!.usernameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretBackendConnectionMysqlOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; @@ -2718,6 +3285,61 @@ export function databaseSecretBackendConnectionMysqlAuroraToTerraform(struct?: D } } + +export function databaseSecretBackendConnectionMysqlAuroraToHclTerraform(struct?: DatabaseSecretBackendConnectionMysqlAuroraOutputReference | DatabaseSecretBackendConnectionMysqlAurora): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + connection_url: { + value: cdktf.stringToHclTerraform(struct!.connectionUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_connection_lifetime: { + value: cdktf.numberToHclTerraform(struct!.maxConnectionLifetime), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_idle_connections: { + value: cdktf.numberToHclTerraform(struct!.maxIdleConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_open_connections: { + value: cdktf.numberToHclTerraform(struct!.maxOpenConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_template: { + value: cdktf.stringToHclTerraform(struct!.usernameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretBackendConnectionMysqlAuroraOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; @@ -2959,6 +3581,61 @@ export function databaseSecretBackendConnectionMysqlLegacyToTerraform(struct?: D } } + +export function databaseSecretBackendConnectionMysqlLegacyToHclTerraform(struct?: DatabaseSecretBackendConnectionMysqlLegacyOutputReference | DatabaseSecretBackendConnectionMysqlLegacy): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + connection_url: { + value: cdktf.stringToHclTerraform(struct!.connectionUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_connection_lifetime: { + value: cdktf.numberToHclTerraform(struct!.maxConnectionLifetime), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_idle_connections: { + value: cdktf.numberToHclTerraform(struct!.maxIdleConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_open_connections: { + value: cdktf.numberToHclTerraform(struct!.maxOpenConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_template: { + value: cdktf.stringToHclTerraform(struct!.usernameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretBackendConnectionMysqlLegacyOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; @@ -3200,6 +3877,61 @@ export function databaseSecretBackendConnectionMysqlRdsToTerraform(struct?: Data } } + +export function databaseSecretBackendConnectionMysqlRdsToHclTerraform(struct?: DatabaseSecretBackendConnectionMysqlRdsOutputReference | DatabaseSecretBackendConnectionMysqlRds): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + connection_url: { + value: cdktf.stringToHclTerraform(struct!.connectionUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_connection_lifetime: { + value: cdktf.numberToHclTerraform(struct!.maxConnectionLifetime), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_idle_connections: { + value: cdktf.numberToHclTerraform(struct!.maxIdleConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_open_connections: { + value: cdktf.numberToHclTerraform(struct!.maxOpenConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_template: { + value: cdktf.stringToHclTerraform(struct!.usernameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretBackendConnectionMysqlRdsOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; @@ -3441,6 +4173,61 @@ export function databaseSecretBackendConnectionOracleToTerraform(struct?: Databa } } + +export function databaseSecretBackendConnectionOracleToHclTerraform(struct?: DatabaseSecretBackendConnectionOracleOutputReference | DatabaseSecretBackendConnectionOracle): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + connection_url: { + value: cdktf.stringToHclTerraform(struct!.connectionUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_connection_lifetime: { + value: cdktf.numberToHclTerraform(struct!.maxConnectionLifetime), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_idle_connections: { + value: cdktf.numberToHclTerraform(struct!.maxIdleConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_open_connections: { + value: cdktf.numberToHclTerraform(struct!.maxOpenConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_template: { + value: cdktf.stringToHclTerraform(struct!.usernameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretBackendConnectionOracleOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; @@ -3703,6 +4490,79 @@ export function databaseSecretBackendConnectionPostgresqlToTerraform(struct?: Da } } + +export function databaseSecretBackendConnectionPostgresqlToHclTerraform(struct?: DatabaseSecretBackendConnectionPostgresqlOutputReference | DatabaseSecretBackendConnectionPostgresql): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + auth_type: { + value: cdktf.stringToHclTerraform(struct!.authType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + connection_url: { + value: cdktf.stringToHclTerraform(struct!.connectionUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disable_escaping: { + value: cdktf.booleanToHclTerraform(struct!.disableEscaping), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + max_connection_lifetime: { + value: cdktf.numberToHclTerraform(struct!.maxConnectionLifetime), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_idle_connections: { + value: cdktf.numberToHclTerraform(struct!.maxIdleConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_open_connections: { + value: cdktf.numberToHclTerraform(struct!.maxOpenConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + service_account_json: { + value: cdktf.stringToHclTerraform(struct!.serviceAccountJson), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_template: { + value: cdktf.stringToHclTerraform(struct!.usernameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretBackendConnectionPostgresqlOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; @@ -4010,6 +4870,61 @@ export function databaseSecretBackendConnectionRedisToTerraform(struct?: Databas } } + +export function databaseSecretBackendConnectionRedisToHclTerraform(struct?: DatabaseSecretBackendConnectionRedisOutputReference | DatabaseSecretBackendConnectionRedis): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + ca_cert: { + value: cdktf.stringToHclTerraform(struct!.caCert), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + host: { + value: cdktf.stringToHclTerraform(struct!.host), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + insecure_tls: { + value: cdktf.booleanToHclTerraform(struct!.insecureTls), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + port: { + value: cdktf.numberToHclTerraform(struct!.port), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + tls: { + value: cdktf.booleanToHclTerraform(struct!.tls), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretBackendConnectionRedisOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; @@ -4221,6 +5136,43 @@ export function databaseSecretBackendConnectionRedisElasticacheToTerraform(struc } } + +export function databaseSecretBackendConnectionRedisElasticacheToHclTerraform(struct?: DatabaseSecretBackendConnectionRedisElasticacheOutputReference | DatabaseSecretBackendConnectionRedisElasticache): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + region: { + value: cdktf.stringToHclTerraform(struct!.region), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + url: { + value: cdktf.stringToHclTerraform(struct!.url), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretBackendConnectionRedisElasticacheOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; @@ -4400,6 +5352,67 @@ export function databaseSecretBackendConnectionRedshiftToTerraform(struct?: Data } } + +export function databaseSecretBackendConnectionRedshiftToHclTerraform(struct?: DatabaseSecretBackendConnectionRedshiftOutputReference | DatabaseSecretBackendConnectionRedshift): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + connection_url: { + value: cdktf.stringToHclTerraform(struct!.connectionUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disable_escaping: { + value: cdktf.booleanToHclTerraform(struct!.disableEscaping), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + max_connection_lifetime: { + value: cdktf.numberToHclTerraform(struct!.maxConnectionLifetime), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_idle_connections: { + value: cdktf.numberToHclTerraform(struct!.maxIdleConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_open_connections: { + value: cdktf.numberToHclTerraform(struct!.maxOpenConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_template: { + value: cdktf.stringToHclTerraform(struct!.usernameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretBackendConnectionRedshiftOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; @@ -4663,6 +5676,61 @@ export function databaseSecretBackendConnectionSnowflakeToTerraform(struct?: Dat } } + +export function databaseSecretBackendConnectionSnowflakeToHclTerraform(struct?: DatabaseSecretBackendConnectionSnowflakeOutputReference | DatabaseSecretBackendConnectionSnowflake): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + connection_url: { + value: cdktf.stringToHclTerraform(struct!.connectionUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_connection_lifetime: { + value: cdktf.numberToHclTerraform(struct!.maxConnectionLifetime), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_idle_connections: { + value: cdktf.numberToHclTerraform(struct!.maxIdleConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_open_connections: { + value: cdktf.numberToHclTerraform(struct!.maxOpenConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_template: { + value: cdktf.stringToHclTerraform(struct!.usernameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretBackendConnectionSnowflakeOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; @@ -5389,4 +6457,174 @@ export class DatabaseSecretBackendConnection extends cdktf.TerraformResource { snowflake: databaseSecretBackendConnectionSnowflakeToTerraform(this._snowflake.internalValue), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + allowed_roles: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._allowedRoles), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + data: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(this._data), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + plugin_name: { + value: cdktf.stringToHclTerraform(this._pluginName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + root_rotation_statements: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._rootRotationStatements), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + verify_connection: { + value: cdktf.booleanToHclTerraform(this._verifyConnection), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + cassandra: { + value: databaseSecretBackendConnectionCassandraToHclTerraform(this._cassandra.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretBackendConnectionCassandraList", + }, + couchbase: { + value: databaseSecretBackendConnectionCouchbaseToHclTerraform(this._couchbase.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretBackendConnectionCouchbaseList", + }, + elasticsearch: { + value: databaseSecretBackendConnectionElasticsearchToHclTerraform(this._elasticsearch.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretBackendConnectionElasticsearchList", + }, + hana: { + value: databaseSecretBackendConnectionHanaToHclTerraform(this._hana.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretBackendConnectionHanaList", + }, + influxdb: { + value: databaseSecretBackendConnectionInfluxdbToHclTerraform(this._influxdb.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretBackendConnectionInfluxdbList", + }, + mongodb: { + value: databaseSecretBackendConnectionMongodbToHclTerraform(this._mongodb.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretBackendConnectionMongodbList", + }, + mongodbatlas: { + value: databaseSecretBackendConnectionMongodbatlasToHclTerraform(this._mongodbatlas.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretBackendConnectionMongodbatlasList", + }, + mssql: { + value: databaseSecretBackendConnectionMssqlToHclTerraform(this._mssql.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretBackendConnectionMssqlList", + }, + mysql: { + value: databaseSecretBackendConnectionMysqlToHclTerraform(this._mysql.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretBackendConnectionMysqlList", + }, + mysql_aurora: { + value: databaseSecretBackendConnectionMysqlAuroraToHclTerraform(this._mysqlAurora.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretBackendConnectionMysqlAuroraList", + }, + mysql_legacy: { + value: databaseSecretBackendConnectionMysqlLegacyToHclTerraform(this._mysqlLegacy.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretBackendConnectionMysqlLegacyList", + }, + mysql_rds: { + value: databaseSecretBackendConnectionMysqlRdsToHclTerraform(this._mysqlRds.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretBackendConnectionMysqlRdsList", + }, + oracle: { + value: databaseSecretBackendConnectionOracleToHclTerraform(this._oracle.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretBackendConnectionOracleList", + }, + postgresql: { + value: databaseSecretBackendConnectionPostgresqlToHclTerraform(this._postgresql.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretBackendConnectionPostgresqlList", + }, + redis: { + value: databaseSecretBackendConnectionRedisToHclTerraform(this._redis.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretBackendConnectionRedisList", + }, + redis_elasticache: { + value: databaseSecretBackendConnectionRedisElasticacheToHclTerraform(this._redisElasticache.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretBackendConnectionRedisElasticacheList", + }, + redshift: { + value: databaseSecretBackendConnectionRedshiftToHclTerraform(this._redshift.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretBackendConnectionRedshiftList", + }, + snowflake: { + value: databaseSecretBackendConnectionSnowflakeToHclTerraform(this._snowflake.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretBackendConnectionSnowflakeList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/database-secret-backend-role/README.md b/src/database-secret-backend-role/README.md index 7b726c9c..851a09c6 100644 --- a/src/database-secret-backend-role/README.md +++ b/src/database-secret-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_database_secret_backend_role` -Refer to the Terraform Registory for docs: [`vault_database_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/database_secret_backend_role). +Refer to the Terraform Registry for docs: [`vault_database_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/database_secret_backend_role). diff --git a/src/database-secret-backend-role/index.ts b/src/database-secret-backend-role/index.ts index b4617d2e..8e5ead3b 100644 --- a/src/database-secret-backend-role/index.ts +++ b/src/database-secret-backend-role/index.ts @@ -380,4 +380,90 @@ export class DatabaseSecretBackendRole extends cdktf.TerraformResource { rollback_statements: cdktf.listMapper(cdktf.stringToTerraform, false)(this._rollbackStatements), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + creation_statements: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._creationStatements), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + credential_config: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(this._credentialConfig), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + credential_type: { + value: cdktf.stringToHclTerraform(this._credentialType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + db_name: { + value: cdktf.stringToHclTerraform(this._dbName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + default_ttl: { + value: cdktf.numberToHclTerraform(this._defaultTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_ttl: { + value: cdktf.numberToHclTerraform(this._maxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + renew_statements: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._renewStatements), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + revocation_statements: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._revocationStatements), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + rollback_statements: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._rollbackStatements), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/database-secret-backend-static-role/README.md b/src/database-secret-backend-static-role/README.md index aa63c944..cc0d098f 100644 --- a/src/database-secret-backend-static-role/README.md +++ b/src/database-secret-backend-static-role/README.md @@ -1,3 +1,3 @@ # `vault_database_secret_backend_static_role` -Refer to the Terraform Registory for docs: [`vault_database_secret_backend_static_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/database_secret_backend_static_role). +Refer to the Terraform Registry for docs: [`vault_database_secret_backend_static_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/database_secret_backend_static_role). diff --git a/src/database-secret-backend-static-role/index.ts b/src/database-secret-backend-static-role/index.ts index 17c98a9f..e108704e 100644 --- a/src/database-secret-backend-static-role/index.ts +++ b/src/database-secret-backend-static-role/index.ts @@ -308,4 +308,72 @@ export class DatabaseSecretBackendStaticRole extends cdktf.TerraformResource { username: cdktf.stringToTerraform(this._username), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + db_name: { + value: cdktf.stringToHclTerraform(this._dbName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + rotation_period: { + value: cdktf.numberToHclTerraform(this._rotationPeriod), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + rotation_schedule: { + value: cdktf.stringToHclTerraform(this._rotationSchedule), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + rotation_statements: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._rotationStatements), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + rotation_window: { + value: cdktf.numberToHclTerraform(this._rotationWindow), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + username: { + value: cdktf.stringToHclTerraform(this._username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/database-secrets-mount/README.md b/src/database-secrets-mount/README.md index 01d04174..013b206a 100644 --- a/src/database-secrets-mount/README.md +++ b/src/database-secrets-mount/README.md @@ -1,3 +1,3 @@ # `vault_database_secrets_mount` -Refer to the Terraform Registory for docs: [`vault_database_secrets_mount`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/database_secrets_mount). +Refer to the Terraform Registry for docs: [`vault_database_secrets_mount`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/database_secrets_mount). diff --git a/src/database-secrets-mount/index.ts b/src/database-secrets-mount/index.ts index 45d3150f..e51c3759 100644 --- a/src/database-secrets-mount/index.ts +++ b/src/database-secrets-mount/index.ts @@ -324,6 +324,115 @@ export function databaseSecretsMountCassandraToTerraform(struct?: DatabaseSecret } } + +export function databaseSecretsMountCassandraToHclTerraform(struct?: DatabaseSecretsMountCassandra | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + allowed_roles: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.allowedRoles), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + connect_timeout: { + value: cdktf.numberToHclTerraform(struct!.connectTimeout), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + data: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(struct!.data), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + hosts: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.hosts), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + insecure_tls: { + value: cdktf.booleanToHclTerraform(struct!.insecureTls), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + name: { + value: cdktf.stringToHclTerraform(struct!.name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + pem_bundle: { + value: cdktf.stringToHclTerraform(struct!.pemBundle), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + pem_json: { + value: cdktf.stringToHclTerraform(struct!.pemJson), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + plugin_name: { + value: cdktf.stringToHclTerraform(struct!.pluginName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + port: { + value: cdktf.numberToHclTerraform(struct!.port), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + protocol_version: { + value: cdktf.numberToHclTerraform(struct!.protocolVersion), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + root_rotation_statements: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.rootRotationStatements), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + tls: { + value: cdktf.booleanToHclTerraform(struct!.tls), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + verify_connection: { + value: cdktf.booleanToHclTerraform(struct!.verifyConnection), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretsMountCassandraOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -841,6 +950,103 @@ export function databaseSecretsMountCouchbaseToTerraform(struct?: DatabaseSecret } } + +export function databaseSecretsMountCouchbaseToHclTerraform(struct?: DatabaseSecretsMountCouchbase | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + allowed_roles: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.allowedRoles), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + base64_pem: { + value: cdktf.stringToHclTerraform(struct!.base64Pem), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + bucket_name: { + value: cdktf.stringToHclTerraform(struct!.bucketName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + data: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(struct!.data), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + hosts: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.hosts), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + insecure_tls: { + value: cdktf.booleanToHclTerraform(struct!.insecureTls), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + name: { + value: cdktf.stringToHclTerraform(struct!.name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + plugin_name: { + value: cdktf.stringToHclTerraform(struct!.pluginName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + root_rotation_statements: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.rootRotationStatements), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + tls: { + value: cdktf.booleanToHclTerraform(struct!.tls), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_template: { + value: cdktf.stringToHclTerraform(struct!.usernameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + verify_connection: { + value: cdktf.booleanToHclTerraform(struct!.verifyConnection), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretsMountCouchbaseOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -1319,6 +1525,115 @@ export function databaseSecretsMountElasticsearchToTerraform(struct?: DatabaseSe } } + +export function databaseSecretsMountElasticsearchToHclTerraform(struct?: DatabaseSecretsMountElasticsearch | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + allowed_roles: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.allowedRoles), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + ca_cert: { + value: cdktf.stringToHclTerraform(struct!.caCert), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ca_path: { + value: cdktf.stringToHclTerraform(struct!.caPath), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + client_cert: { + value: cdktf.stringToHclTerraform(struct!.clientCert), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + client_key: { + value: cdktf.stringToHclTerraform(struct!.clientKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + data: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(struct!.data), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + insecure: { + value: cdktf.booleanToHclTerraform(struct!.insecure), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + name: { + value: cdktf.stringToHclTerraform(struct!.name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + plugin_name: { + value: cdktf.stringToHclTerraform(struct!.pluginName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + root_rotation_statements: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.rootRotationStatements), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + tls_server_name: { + value: cdktf.stringToHclTerraform(struct!.tlsServerName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + url: { + value: cdktf.stringToHclTerraform(struct!.url), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_template: { + value: cdktf.stringToHclTerraform(struct!.usernameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + verify_connection: { + value: cdktf.booleanToHclTerraform(struct!.verifyConnection), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretsMountElasticsearchOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -1820,6 +2135,97 @@ export function databaseSecretsMountHanaToTerraform(struct?: DatabaseSecretsMoun } } + +export function databaseSecretsMountHanaToHclTerraform(struct?: DatabaseSecretsMountHana | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + allowed_roles: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.allowedRoles), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + connection_url: { + value: cdktf.stringToHclTerraform(struct!.connectionUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + data: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(struct!.data), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + disable_escaping: { + value: cdktf.booleanToHclTerraform(struct!.disableEscaping), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + max_connection_lifetime: { + value: cdktf.numberToHclTerraform(struct!.maxConnectionLifetime), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_idle_connections: { + value: cdktf.numberToHclTerraform(struct!.maxIdleConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_open_connections: { + value: cdktf.numberToHclTerraform(struct!.maxOpenConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + name: { + value: cdktf.stringToHclTerraform(struct!.name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + plugin_name: { + value: cdktf.stringToHclTerraform(struct!.pluginName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + root_rotation_statements: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.rootRotationStatements), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + verify_connection: { + value: cdktf.booleanToHclTerraform(struct!.verifyConnection), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretsMountHanaOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -2285,6 +2691,115 @@ export function databaseSecretsMountInfluxdbToTerraform(struct?: DatabaseSecrets } } + +export function databaseSecretsMountInfluxdbToHclTerraform(struct?: DatabaseSecretsMountInfluxdb | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + allowed_roles: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.allowedRoles), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + connect_timeout: { + value: cdktf.numberToHclTerraform(struct!.connectTimeout), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + data: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(struct!.data), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + host: { + value: cdktf.stringToHclTerraform(struct!.host), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + insecure_tls: { + value: cdktf.booleanToHclTerraform(struct!.insecureTls), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + name: { + value: cdktf.stringToHclTerraform(struct!.name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + pem_bundle: { + value: cdktf.stringToHclTerraform(struct!.pemBundle), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + pem_json: { + value: cdktf.stringToHclTerraform(struct!.pemJson), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + plugin_name: { + value: cdktf.stringToHclTerraform(struct!.pluginName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + port: { + value: cdktf.numberToHclTerraform(struct!.port), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + root_rotation_statements: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.rootRotationStatements), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + tls: { + value: cdktf.booleanToHclTerraform(struct!.tls), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_template: { + value: cdktf.stringToHclTerraform(struct!.usernameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + verify_connection: { + value: cdktf.booleanToHclTerraform(struct!.verifyConnection), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretsMountInfluxdbOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -2786,6 +3301,97 @@ export function databaseSecretsMountMongodbToTerraform(struct?: DatabaseSecretsM } } + +export function databaseSecretsMountMongodbToHclTerraform(struct?: DatabaseSecretsMountMongodb | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + allowed_roles: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.allowedRoles), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + connection_url: { + value: cdktf.stringToHclTerraform(struct!.connectionUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + data: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(struct!.data), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + max_connection_lifetime: { + value: cdktf.numberToHclTerraform(struct!.maxConnectionLifetime), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_idle_connections: { + value: cdktf.numberToHclTerraform(struct!.maxIdleConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_open_connections: { + value: cdktf.numberToHclTerraform(struct!.maxOpenConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + name: { + value: cdktf.stringToHclTerraform(struct!.name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + plugin_name: { + value: cdktf.stringToHclTerraform(struct!.pluginName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + root_rotation_statements: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.rootRotationStatements), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_template: { + value: cdktf.stringToHclTerraform(struct!.usernameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + verify_connection: { + value: cdktf.booleanToHclTerraform(struct!.verifyConnection), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretsMountMongodbOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -3202,6 +3808,73 @@ export function databaseSecretsMountMongodbatlasToTerraform(struct?: DatabaseSec } } + +export function databaseSecretsMountMongodbatlasToHclTerraform(struct?: DatabaseSecretsMountMongodbatlas | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + allowed_roles: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.allowedRoles), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + data: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(struct!.data), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + name: { + value: cdktf.stringToHclTerraform(struct!.name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + plugin_name: { + value: cdktf.stringToHclTerraform(struct!.pluginName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + private_key: { + value: cdktf.stringToHclTerraform(struct!.privateKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + project_id: { + value: cdktf.stringToHclTerraform(struct!.projectId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + public_key: { + value: cdktf.stringToHclTerraform(struct!.publicKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + root_rotation_statements: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.rootRotationStatements), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + verify_connection: { + value: cdktf.booleanToHclTerraform(struct!.verifyConnection), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretsMountMongodbatlasOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -3563,6 +4236,109 @@ export function databaseSecretsMountMssqlToTerraform(struct?: DatabaseSecretsMou } } + +export function databaseSecretsMountMssqlToHclTerraform(struct?: DatabaseSecretsMountMssql | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + allowed_roles: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.allowedRoles), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + connection_url: { + value: cdktf.stringToHclTerraform(struct!.connectionUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + contained_db: { + value: cdktf.booleanToHclTerraform(struct!.containedDb), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + data: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(struct!.data), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + disable_escaping: { + value: cdktf.booleanToHclTerraform(struct!.disableEscaping), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + max_connection_lifetime: { + value: cdktf.numberToHclTerraform(struct!.maxConnectionLifetime), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_idle_connections: { + value: cdktf.numberToHclTerraform(struct!.maxIdleConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_open_connections: { + value: cdktf.numberToHclTerraform(struct!.maxOpenConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + name: { + value: cdktf.stringToHclTerraform(struct!.name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + plugin_name: { + value: cdktf.stringToHclTerraform(struct!.pluginName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + root_rotation_statements: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.rootRotationStatements), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_template: { + value: cdktf.stringToHclTerraform(struct!.usernameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + verify_connection: { + value: cdktf.booleanToHclTerraform(struct!.verifyConnection), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretsMountMssqlOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -4079,6 +4855,121 @@ export function databaseSecretsMountMysqlToTerraform(struct?: DatabaseSecretsMou } } + +export function databaseSecretsMountMysqlToHclTerraform(struct?: DatabaseSecretsMountMysql | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + allowed_roles: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.allowedRoles), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + auth_type: { + value: cdktf.stringToHclTerraform(struct!.authType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + connection_url: { + value: cdktf.stringToHclTerraform(struct!.connectionUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + data: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(struct!.data), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + max_connection_lifetime: { + value: cdktf.numberToHclTerraform(struct!.maxConnectionLifetime), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_idle_connections: { + value: cdktf.numberToHclTerraform(struct!.maxIdleConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_open_connections: { + value: cdktf.numberToHclTerraform(struct!.maxOpenConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + name: { + value: cdktf.stringToHclTerraform(struct!.name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + plugin_name: { + value: cdktf.stringToHclTerraform(struct!.pluginName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + root_rotation_statements: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.rootRotationStatements), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + service_account_json: { + value: cdktf.stringToHclTerraform(struct!.serviceAccountJson), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + tls_ca: { + value: cdktf.stringToHclTerraform(struct!.tlsCa), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + tls_certificate_key: { + value: cdktf.stringToHclTerraform(struct!.tlsCertificateKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_template: { + value: cdktf.stringToHclTerraform(struct!.usernameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + verify_connection: { + value: cdktf.booleanToHclTerraform(struct!.verifyConnection), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretsMountMysqlOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -4611,6 +5502,97 @@ export function databaseSecretsMountMysqlAuroraToTerraform(struct?: DatabaseSecr } } + +export function databaseSecretsMountMysqlAuroraToHclTerraform(struct?: DatabaseSecretsMountMysqlAurora | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + allowed_roles: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.allowedRoles), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + connection_url: { + value: cdktf.stringToHclTerraform(struct!.connectionUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + data: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(struct!.data), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + max_connection_lifetime: { + value: cdktf.numberToHclTerraform(struct!.maxConnectionLifetime), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_idle_connections: { + value: cdktf.numberToHclTerraform(struct!.maxIdleConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_open_connections: { + value: cdktf.numberToHclTerraform(struct!.maxOpenConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + name: { + value: cdktf.stringToHclTerraform(struct!.name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + plugin_name: { + value: cdktf.stringToHclTerraform(struct!.pluginName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + root_rotation_statements: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.rootRotationStatements), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_template: { + value: cdktf.stringToHclTerraform(struct!.usernameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + verify_connection: { + value: cdktf.booleanToHclTerraform(struct!.verifyConnection), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretsMountMysqlAuroraOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -5055,6 +6037,97 @@ export function databaseSecretsMountMysqlLegacyToTerraform(struct?: DatabaseSecr } } + +export function databaseSecretsMountMysqlLegacyToHclTerraform(struct?: DatabaseSecretsMountMysqlLegacy | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + allowed_roles: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.allowedRoles), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + connection_url: { + value: cdktf.stringToHclTerraform(struct!.connectionUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + data: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(struct!.data), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + max_connection_lifetime: { + value: cdktf.numberToHclTerraform(struct!.maxConnectionLifetime), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_idle_connections: { + value: cdktf.numberToHclTerraform(struct!.maxIdleConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_open_connections: { + value: cdktf.numberToHclTerraform(struct!.maxOpenConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + name: { + value: cdktf.stringToHclTerraform(struct!.name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + plugin_name: { + value: cdktf.stringToHclTerraform(struct!.pluginName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + root_rotation_statements: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.rootRotationStatements), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_template: { + value: cdktf.stringToHclTerraform(struct!.usernameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + verify_connection: { + value: cdktf.booleanToHclTerraform(struct!.verifyConnection), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretsMountMysqlLegacyOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -5499,6 +6572,97 @@ export function databaseSecretsMountMysqlRdsToTerraform(struct?: DatabaseSecrets } } + +export function databaseSecretsMountMysqlRdsToHclTerraform(struct?: DatabaseSecretsMountMysqlRds | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + allowed_roles: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.allowedRoles), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + connection_url: { + value: cdktf.stringToHclTerraform(struct!.connectionUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + data: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(struct!.data), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + max_connection_lifetime: { + value: cdktf.numberToHclTerraform(struct!.maxConnectionLifetime), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_idle_connections: { + value: cdktf.numberToHclTerraform(struct!.maxIdleConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_open_connections: { + value: cdktf.numberToHclTerraform(struct!.maxOpenConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + name: { + value: cdktf.stringToHclTerraform(struct!.name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + plugin_name: { + value: cdktf.stringToHclTerraform(struct!.pluginName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + root_rotation_statements: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.rootRotationStatements), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_template: { + value: cdktf.stringToHclTerraform(struct!.usernameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + verify_connection: { + value: cdktf.booleanToHclTerraform(struct!.verifyConnection), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretsMountMysqlRdsOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -5943,6 +7107,97 @@ export function databaseSecretsMountOracleToTerraform(struct?: DatabaseSecretsMo } } + +export function databaseSecretsMountOracleToHclTerraform(struct?: DatabaseSecretsMountOracle | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + allowed_roles: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.allowedRoles), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + connection_url: { + value: cdktf.stringToHclTerraform(struct!.connectionUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + data: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(struct!.data), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + max_connection_lifetime: { + value: cdktf.numberToHclTerraform(struct!.maxConnectionLifetime), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_idle_connections: { + value: cdktf.numberToHclTerraform(struct!.maxIdleConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_open_connections: { + value: cdktf.numberToHclTerraform(struct!.maxOpenConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + name: { + value: cdktf.stringToHclTerraform(struct!.name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + plugin_name: { + value: cdktf.stringToHclTerraform(struct!.pluginName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + root_rotation_statements: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.rootRotationStatements), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_template: { + value: cdktf.stringToHclTerraform(struct!.usernameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + verify_connection: { + value: cdktf.booleanToHclTerraform(struct!.verifyConnection), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretsMountOracleOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -6408,6 +7663,115 @@ export function databaseSecretsMountPostgresqlToTerraform(struct?: DatabaseSecre } } + +export function databaseSecretsMountPostgresqlToHclTerraform(struct?: DatabaseSecretsMountPostgresql | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + allowed_roles: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.allowedRoles), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + auth_type: { + value: cdktf.stringToHclTerraform(struct!.authType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + connection_url: { + value: cdktf.stringToHclTerraform(struct!.connectionUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + data: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(struct!.data), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + disable_escaping: { + value: cdktf.booleanToHclTerraform(struct!.disableEscaping), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + max_connection_lifetime: { + value: cdktf.numberToHclTerraform(struct!.maxConnectionLifetime), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_idle_connections: { + value: cdktf.numberToHclTerraform(struct!.maxIdleConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_open_connections: { + value: cdktf.numberToHclTerraform(struct!.maxOpenConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + name: { + value: cdktf.stringToHclTerraform(struct!.name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + plugin_name: { + value: cdktf.stringToHclTerraform(struct!.pluginName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + root_rotation_statements: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.rootRotationStatements), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + service_account_json: { + value: cdktf.stringToHclTerraform(struct!.serviceAccountJson), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_template: { + value: cdktf.stringToHclTerraform(struct!.usernameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + verify_connection: { + value: cdktf.booleanToHclTerraform(struct!.verifyConnection), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretsMountPostgresqlOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -6918,6 +8282,97 @@ export function databaseSecretsMountRedisToTerraform(struct?: DatabaseSecretsMou } } + +export function databaseSecretsMountRedisToHclTerraform(struct?: DatabaseSecretsMountRedis | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + allowed_roles: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.allowedRoles), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + ca_cert: { + value: cdktf.stringToHclTerraform(struct!.caCert), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + data: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(struct!.data), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + host: { + value: cdktf.stringToHclTerraform(struct!.host), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + insecure_tls: { + value: cdktf.booleanToHclTerraform(struct!.insecureTls), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + name: { + value: cdktf.stringToHclTerraform(struct!.name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + plugin_name: { + value: cdktf.stringToHclTerraform(struct!.pluginName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + port: { + value: cdktf.numberToHclTerraform(struct!.port), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + root_rotation_statements: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.rootRotationStatements), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + tls: { + value: cdktf.booleanToHclTerraform(struct!.tls), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + verify_connection: { + value: cdktf.booleanToHclTerraform(struct!.verifyConnection), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretsMountRedisOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -7332,6 +8787,79 @@ export function databaseSecretsMountRedisElasticacheToTerraform(struct?: Databas } } + +export function databaseSecretsMountRedisElasticacheToHclTerraform(struct?: DatabaseSecretsMountRedisElasticache | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + allowed_roles: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.allowedRoles), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + data: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(struct!.data), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + name: { + value: cdktf.stringToHclTerraform(struct!.name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + plugin_name: { + value: cdktf.stringToHclTerraform(struct!.pluginName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + region: { + value: cdktf.stringToHclTerraform(struct!.region), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + root_rotation_statements: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.rootRotationStatements), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + url: { + value: cdktf.stringToHclTerraform(struct!.url), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + verify_connection: { + value: cdktf.booleanToHclTerraform(struct!.verifyConnection), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretsMountRedisElasticacheOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -7714,6 +9242,103 @@ export function databaseSecretsMountRedshiftToTerraform(struct?: DatabaseSecrets } } + +export function databaseSecretsMountRedshiftToHclTerraform(struct?: DatabaseSecretsMountRedshift | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + allowed_roles: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.allowedRoles), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + connection_url: { + value: cdktf.stringToHclTerraform(struct!.connectionUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + data: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(struct!.data), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + disable_escaping: { + value: cdktf.booleanToHclTerraform(struct!.disableEscaping), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + max_connection_lifetime: { + value: cdktf.numberToHclTerraform(struct!.maxConnectionLifetime), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_idle_connections: { + value: cdktf.numberToHclTerraform(struct!.maxIdleConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_open_connections: { + value: cdktf.numberToHclTerraform(struct!.maxOpenConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + name: { + value: cdktf.stringToHclTerraform(struct!.name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + plugin_name: { + value: cdktf.stringToHclTerraform(struct!.pluginName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + root_rotation_statements: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.rootRotationStatements), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_template: { + value: cdktf.stringToHclTerraform(struct!.usernameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + verify_connection: { + value: cdktf.booleanToHclTerraform(struct!.verifyConnection), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretsMountRedshiftOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -8180,6 +9805,97 @@ export function databaseSecretsMountSnowflakeToTerraform(struct?: DatabaseSecret } } + +export function databaseSecretsMountSnowflakeToHclTerraform(struct?: DatabaseSecretsMountSnowflake | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + allowed_roles: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.allowedRoles), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + connection_url: { + value: cdktf.stringToHclTerraform(struct!.connectionUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + data: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(struct!.data), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + max_connection_lifetime: { + value: cdktf.numberToHclTerraform(struct!.maxConnectionLifetime), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_idle_connections: { + value: cdktf.numberToHclTerraform(struct!.maxIdleConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_open_connections: { + value: cdktf.numberToHclTerraform(struct!.maxOpenConnections), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + name: { + value: cdktf.stringToHclTerraform(struct!.name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + plugin_name: { + value: cdktf.stringToHclTerraform(struct!.pluginName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + root_rotation_statements: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.rootRotationStatements), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_template: { + value: cdktf.stringToHclTerraform(struct!.usernameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + verify_connection: { + value: cdktf.booleanToHclTerraform(struct!.verifyConnection), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class DatabaseSecretsMountSnowflakeOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -9152,4 +10868,198 @@ export class DatabaseSecretsMount extends cdktf.TerraformResource { snowflake: cdktf.listMapper(databaseSecretsMountSnowflakeToTerraform, true)(this._snowflake.internalValue), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + allowed_managed_keys: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._allowedManagedKeys), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + audit_non_hmac_request_keys: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._auditNonHmacRequestKeys), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + audit_non_hmac_response_keys: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._auditNonHmacResponseKeys), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + default_lease_ttl_seconds: { + value: cdktf.numberToHclTerraform(this._defaultLeaseTtlSeconds), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + description: { + value: cdktf.stringToHclTerraform(this._description), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + external_entropy_access: { + value: cdktf.booleanToHclTerraform(this._externalEntropyAccess), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + local: { + value: cdktf.booleanToHclTerraform(this._local), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + max_lease_ttl_seconds: { + value: cdktf.numberToHclTerraform(this._maxLeaseTtlSeconds), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + options: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(this._options), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + seal_wrap: { + value: cdktf.booleanToHclTerraform(this._sealWrap), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + cassandra: { + value: cdktf.listMapperHcl(databaseSecretsMountCassandraToHclTerraform, true)(this._cassandra.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretsMountCassandraList", + }, + couchbase: { + value: cdktf.listMapperHcl(databaseSecretsMountCouchbaseToHclTerraform, true)(this._couchbase.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretsMountCouchbaseList", + }, + elasticsearch: { + value: cdktf.listMapperHcl(databaseSecretsMountElasticsearchToHclTerraform, true)(this._elasticsearch.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretsMountElasticsearchList", + }, + hana: { + value: cdktf.listMapperHcl(databaseSecretsMountHanaToHclTerraform, true)(this._hana.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretsMountHanaList", + }, + influxdb: { + value: cdktf.listMapperHcl(databaseSecretsMountInfluxdbToHclTerraform, true)(this._influxdb.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretsMountInfluxdbList", + }, + mongodb: { + value: cdktf.listMapperHcl(databaseSecretsMountMongodbToHclTerraform, true)(this._mongodb.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretsMountMongodbList", + }, + mongodbatlas: { + value: cdktf.listMapperHcl(databaseSecretsMountMongodbatlasToHclTerraform, true)(this._mongodbatlas.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretsMountMongodbatlasList", + }, + mssql: { + value: cdktf.listMapperHcl(databaseSecretsMountMssqlToHclTerraform, true)(this._mssql.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretsMountMssqlList", + }, + mysql: { + value: cdktf.listMapperHcl(databaseSecretsMountMysqlToHclTerraform, true)(this._mysql.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretsMountMysqlList", + }, + mysql_aurora: { + value: cdktf.listMapperHcl(databaseSecretsMountMysqlAuroraToHclTerraform, true)(this._mysqlAurora.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretsMountMysqlAuroraList", + }, + mysql_legacy: { + value: cdktf.listMapperHcl(databaseSecretsMountMysqlLegacyToHclTerraform, true)(this._mysqlLegacy.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretsMountMysqlLegacyList", + }, + mysql_rds: { + value: cdktf.listMapperHcl(databaseSecretsMountMysqlRdsToHclTerraform, true)(this._mysqlRds.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretsMountMysqlRdsList", + }, + oracle: { + value: cdktf.listMapperHcl(databaseSecretsMountOracleToHclTerraform, true)(this._oracle.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretsMountOracleList", + }, + postgresql: { + value: cdktf.listMapperHcl(databaseSecretsMountPostgresqlToHclTerraform, true)(this._postgresql.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretsMountPostgresqlList", + }, + redis: { + value: cdktf.listMapperHcl(databaseSecretsMountRedisToHclTerraform, true)(this._redis.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretsMountRedisList", + }, + redis_elasticache: { + value: cdktf.listMapperHcl(databaseSecretsMountRedisElasticacheToHclTerraform, true)(this._redisElasticache.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretsMountRedisElasticacheList", + }, + redshift: { + value: cdktf.listMapperHcl(databaseSecretsMountRedshiftToHclTerraform, true)(this._redshift.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretsMountRedshiftList", + }, + snowflake: { + value: cdktf.listMapperHcl(databaseSecretsMountSnowflakeToHclTerraform, true)(this._snowflake.internalValue), + isBlock: true, + type: "list", + storageClassType: "DatabaseSecretsMountSnowflakeList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/egp-policy/README.md b/src/egp-policy/README.md index dab2cda5..a4a8baee 100644 --- a/src/egp-policy/README.md +++ b/src/egp-policy/README.md @@ -1,3 +1,3 @@ # `vault_egp_policy` -Refer to the Terraform Registory for docs: [`vault_egp_policy`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/egp_policy). +Refer to the Terraform Registry for docs: [`vault_egp_policy`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/egp_policy). diff --git a/src/egp-policy/index.ts b/src/egp-policy/index.ts index a54ad743..30190754 100644 --- a/src/egp-policy/index.ts +++ b/src/egp-policy/index.ts @@ -212,4 +212,48 @@ export class EgpPolicy extends cdktf.TerraformResource { policy: cdktf.stringToTerraform(this._policy), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + enforcement_level: { + value: cdktf.stringToHclTerraform(this._enforcementLevel), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + paths: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._paths), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + policy: { + value: cdktf.stringToHclTerraform(this._policy), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/gcp-auth-backend-role/README.md b/src/gcp-auth-backend-role/README.md index fa8eb823..10b01829 100644 --- a/src/gcp-auth-backend-role/README.md +++ b/src/gcp-auth-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_gcp_auth_backend_role` -Refer to the Terraform Registory for docs: [`vault_gcp_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/gcp_auth_backend_role). +Refer to the Terraform Registry for docs: [`vault_gcp_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/gcp_auth_backend_role). diff --git a/src/gcp-auth-backend-role/index.ts b/src/gcp-auth-backend-role/index.ts index 35b588e5..6ccf970b 100644 --- a/src/gcp-auth-backend-role/index.ts +++ b/src/gcp-auth-backend-role/index.ts @@ -602,4 +602,150 @@ export class GcpAuthBackendRole extends cdktf.TerraformResource { type: cdktf.stringToTerraform(this._type), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + add_group_aliases: { + value: cdktf.booleanToHclTerraform(this._addGroupAliases), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + allow_gce_inference: { + value: cdktf.booleanToHclTerraform(this._allowGceInference), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + bound_instance_groups: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._boundInstanceGroups), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + bound_labels: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._boundLabels), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + bound_projects: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._boundProjects), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + bound_regions: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._boundRegions), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + bound_service_accounts: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._boundServiceAccounts), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + bound_zones: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._boundZones), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_jwt_exp: { + value: cdktf.stringToHclTerraform(this._maxJwtExp), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role: { + value: cdktf.stringToHclTerraform(this._role), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + token_bound_cidrs: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenBoundCidrs), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_explicit_max_ttl: { + value: cdktf.numberToHclTerraform(this._tokenExplicitMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_max_ttl: { + value: cdktf.numberToHclTerraform(this._tokenMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_no_default_policy: { + value: cdktf.booleanToHclTerraform(this._tokenNoDefaultPolicy), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + token_num_uses: { + value: cdktf.numberToHclTerraform(this._tokenNumUses), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_period: { + value: cdktf.numberToHclTerraform(this._tokenPeriod), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenPolicies), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_ttl: { + value: cdktf.numberToHclTerraform(this._tokenTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_type: { + value: cdktf.stringToHclTerraform(this._tokenType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + type: { + value: cdktf.stringToHclTerraform(this._type), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/gcp-auth-backend/README.md b/src/gcp-auth-backend/README.md index b2ed96d3..c65bc455 100644 --- a/src/gcp-auth-backend/README.md +++ b/src/gcp-auth-backend/README.md @@ -1,3 +1,3 @@ # `vault_gcp_auth_backend` -Refer to the Terraform Registory for docs: [`vault_gcp_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/gcp_auth_backend). +Refer to the Terraform Registry for docs: [`vault_gcp_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/gcp_auth_backend). diff --git a/src/gcp-auth-backend/index.ts b/src/gcp-auth-backend/index.ts index 5e18829e..c525b432 100644 --- a/src/gcp-auth-backend/index.ts +++ b/src/gcp-auth-backend/index.ts @@ -112,6 +112,43 @@ export function gcpAuthBackendCustomEndpointToTerraform(struct?: GcpAuthBackendC } } + +export function gcpAuthBackendCustomEndpointToHclTerraform(struct?: GcpAuthBackendCustomEndpointOutputReference | GcpAuthBackendCustomEndpoint): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + api: { + value: cdktf.stringToHclTerraform(struct!.api), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + compute: { + value: cdktf.stringToHclTerraform(struct!.compute), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + crm: { + value: cdktf.stringToHclTerraform(struct!.crm), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + iam: { + value: cdktf.stringToHclTerraform(struct!.iam), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class GcpAuthBackendCustomEndpointOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; @@ -513,4 +550,84 @@ export class GcpAuthBackend extends cdktf.TerraformResource { custom_endpoint: gcpAuthBackendCustomEndpointToTerraform(this._customEndpoint.internalValue), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + client_email: { + value: cdktf.stringToHclTerraform(this._clientEmail), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + client_id: { + value: cdktf.stringToHclTerraform(this._clientId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + credentials: { + value: cdktf.stringToHclTerraform(this._credentials), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + description: { + value: cdktf.stringToHclTerraform(this._description), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disable_remount: { + value: cdktf.booleanToHclTerraform(this._disableRemount), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + local: { + value: cdktf.booleanToHclTerraform(this._local), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + private_key_id: { + value: cdktf.stringToHclTerraform(this._privateKeyId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + project_id: { + value: cdktf.stringToHclTerraform(this._projectId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + custom_endpoint: { + value: gcpAuthBackendCustomEndpointToHclTerraform(this._customEndpoint.internalValue), + isBlock: true, + type: "list", + storageClassType: "GcpAuthBackendCustomEndpointList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/gcp-secret-backend/README.md b/src/gcp-secret-backend/README.md index c95d68e6..987e6750 100644 --- a/src/gcp-secret-backend/README.md +++ b/src/gcp-secret-backend/README.md @@ -1,3 +1,3 @@ # `vault_gcp_secret_backend` -Refer to the Terraform Registory for docs: [`vault_gcp_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/gcp_secret_backend). +Refer to the Terraform Registry for docs: [`vault_gcp_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/gcp_secret_backend). diff --git a/src/gcp-secret-backend/index.ts b/src/gcp-secret-backend/index.ts index adc92396..97b651e6 100644 --- a/src/gcp-secret-backend/index.ts +++ b/src/gcp-secret-backend/index.ts @@ -296,4 +296,66 @@ export class GcpSecretBackend extends cdktf.TerraformResource { path: cdktf.stringToTerraform(this._path), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + credentials: { + value: cdktf.stringToHclTerraform(this._credentials), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + default_lease_ttl_seconds: { + value: cdktf.numberToHclTerraform(this._defaultLeaseTtlSeconds), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + description: { + value: cdktf.stringToHclTerraform(this._description), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disable_remount: { + value: cdktf.booleanToHclTerraform(this._disableRemount), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + local: { + value: cdktf.booleanToHclTerraform(this._local), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + max_lease_ttl_seconds: { + value: cdktf.numberToHclTerraform(this._maxLeaseTtlSeconds), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/gcp-secret-impersonated-account/README.md b/src/gcp-secret-impersonated-account/README.md index 17673136..c34458e2 100644 --- a/src/gcp-secret-impersonated-account/README.md +++ b/src/gcp-secret-impersonated-account/README.md @@ -1,3 +1,3 @@ # `vault_gcp_secret_impersonated_account` -Refer to the Terraform Registory for docs: [`vault_gcp_secret_impersonated_account`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/gcp_secret_impersonated_account). +Refer to the Terraform Registry for docs: [`vault_gcp_secret_impersonated_account`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/gcp_secret_impersonated_account). diff --git a/src/gcp-secret-impersonated-account/index.ts b/src/gcp-secret-impersonated-account/index.ts index 520696f8..f440dc53 100644 --- a/src/gcp-secret-impersonated-account/index.ts +++ b/src/gcp-secret-impersonated-account/index.ts @@ -220,4 +220,48 @@ export class GcpSecretImpersonatedAccount extends cdktf.TerraformResource { token_scopes: cdktf.listMapper(cdktf.stringToTerraform, false)(this._tokenScopes), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + impersonated_account: { + value: cdktf.stringToHclTerraform(this._impersonatedAccount), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + service_account_email: { + value: cdktf.stringToHclTerraform(this._serviceAccountEmail), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + token_scopes: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenScopes), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/gcp-secret-roleset/README.md b/src/gcp-secret-roleset/README.md index 22c84fa1..746d42d9 100644 --- a/src/gcp-secret-roleset/README.md +++ b/src/gcp-secret-roleset/README.md @@ -1,3 +1,3 @@ # `vault_gcp_secret_roleset` -Refer to the Terraform Registory for docs: [`vault_gcp_secret_roleset`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/gcp_secret_roleset). +Refer to the Terraform Registry for docs: [`vault_gcp_secret_roleset`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/gcp_secret_roleset). diff --git a/src/gcp-secret-roleset/index.ts b/src/gcp-secret-roleset/index.ts index 38b9bf46..0847a667 100644 --- a/src/gcp-secret-roleset/index.ts +++ b/src/gcp-secret-roleset/index.ts @@ -88,6 +88,31 @@ export function gcpSecretRolesetBindingToTerraform(struct?: GcpSecretRolesetBind } } + +export function gcpSecretRolesetBindingToHclTerraform(struct?: GcpSecretRolesetBinding | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + resource: { + value: cdktf.stringToHclTerraform(struct!.resource), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + roles: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.roles), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class GcpSecretRolesetBindingOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -387,4 +412,60 @@ export class GcpSecretRoleset extends cdktf.TerraformResource { binding: cdktf.listMapper(gcpSecretRolesetBindingToTerraform, true)(this._binding.internalValue), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + project: { + value: cdktf.stringToHclTerraform(this._project), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + roleset: { + value: cdktf.stringToHclTerraform(this._roleset), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + secret_type: { + value: cdktf.stringToHclTerraform(this._secretType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + token_scopes: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenScopes), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + binding: { + value: cdktf.listMapperHcl(gcpSecretRolesetBindingToHclTerraform, true)(this._binding.internalValue), + isBlock: true, + type: "set", + storageClassType: "GcpSecretRolesetBindingList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/gcp-secret-static-account/README.md b/src/gcp-secret-static-account/README.md index a76440ca..5e93304e 100644 --- a/src/gcp-secret-static-account/README.md +++ b/src/gcp-secret-static-account/README.md @@ -1,3 +1,3 @@ # `vault_gcp_secret_static_account` -Refer to the Terraform Registory for docs: [`vault_gcp_secret_static_account`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/gcp_secret_static_account). +Refer to the Terraform Registry for docs: [`vault_gcp_secret_static_account`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/gcp_secret_static_account). diff --git a/src/gcp-secret-static-account/index.ts b/src/gcp-secret-static-account/index.ts index f20f231d..aca30366 100644 --- a/src/gcp-secret-static-account/index.ts +++ b/src/gcp-secret-static-account/index.ts @@ -88,6 +88,31 @@ export function gcpSecretStaticAccountBindingToTerraform(struct?: GcpSecretStati } } + +export function gcpSecretStaticAccountBindingToHclTerraform(struct?: GcpSecretStaticAccountBinding | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + resource: { + value: cdktf.stringToHclTerraform(struct!.resource), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + roles: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.roles), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class GcpSecretStaticAccountBindingOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -390,4 +415,60 @@ export class GcpSecretStaticAccount extends cdktf.TerraformResource { binding: cdktf.listMapper(gcpSecretStaticAccountBindingToTerraform, true)(this._binding.internalValue), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + secret_type: { + value: cdktf.stringToHclTerraform(this._secretType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + service_account_email: { + value: cdktf.stringToHclTerraform(this._serviceAccountEmail), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + static_account: { + value: cdktf.stringToHclTerraform(this._staticAccount), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + token_scopes: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenScopes), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + binding: { + value: cdktf.listMapperHcl(gcpSecretStaticAccountBindingToHclTerraform, true)(this._binding.internalValue), + isBlock: true, + type: "set", + storageClassType: "GcpSecretStaticAccountBindingList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/generic-endpoint/README.md b/src/generic-endpoint/README.md index 6ab2e9a5..84257dc1 100644 --- a/src/generic-endpoint/README.md +++ b/src/generic-endpoint/README.md @@ -1,3 +1,3 @@ # `vault_generic_endpoint` -Refer to the Terraform Registory for docs: [`vault_generic_endpoint`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/generic_endpoint). +Refer to the Terraform Registry for docs: [`vault_generic_endpoint`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/generic_endpoint). diff --git a/src/generic-endpoint/index.ts b/src/generic-endpoint/index.ts index 76c6dc18..ccd6db40 100644 --- a/src/generic-endpoint/index.ts +++ b/src/generic-endpoint/index.ts @@ -277,4 +277,60 @@ export class GenericEndpoint extends cdktf.TerraformResource { write_fields: cdktf.listMapper(cdktf.stringToTerraform, false)(this._writeFields), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + data_json: { + value: cdktf.stringToHclTerraform(this._dataJson), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disable_delete: { + value: cdktf.booleanToHclTerraform(this._disableDelete), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + disable_read: { + value: cdktf.booleanToHclTerraform(this._disableRead), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ignore_absent_fields: { + value: cdktf.booleanToHclTerraform(this._ignoreAbsentFields), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + write_fields: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._writeFields), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/generic-secret/README.md b/src/generic-secret/README.md index 484f1bcf..b27146d6 100644 --- a/src/generic-secret/README.md +++ b/src/generic-secret/README.md @@ -1,3 +1,3 @@ # `vault_generic_secret` -Refer to the Terraform Registory for docs: [`vault_generic_secret`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/generic_secret). +Refer to the Terraform Registry for docs: [`vault_generic_secret`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/generic_secret). diff --git a/src/generic-secret/index.ts b/src/generic-secret/index.ts index 9b2465a4..c353d516 100644 --- a/src/generic-secret/index.ts +++ b/src/generic-secret/index.ts @@ -224,4 +224,48 @@ export class GenericSecret extends cdktf.TerraformResource { path: cdktf.stringToTerraform(this._path), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + data_json: { + value: cdktf.stringToHclTerraform(this._dataJson), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + delete_all_versions: { + value: cdktf.booleanToHclTerraform(this._deleteAllVersions), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + disable_read: { + value: cdktf.booleanToHclTerraform(this._disableRead), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/github-auth-backend/README.md b/src/github-auth-backend/README.md index aa0a1661..06fd253d 100644 --- a/src/github-auth-backend/README.md +++ b/src/github-auth-backend/README.md @@ -1,3 +1,3 @@ # `vault_github_auth_backend` -Refer to the Terraform Registory for docs: [`vault_github_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/github_auth_backend). +Refer to the Terraform Registry for docs: [`vault_github_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/github_auth_backend). diff --git a/src/github-auth-backend/index.ts b/src/github-auth-backend/index.ts index 79f5730c..19c7cdd3 100644 --- a/src/github-auth-backend/index.ts +++ b/src/github-auth-backend/index.ts @@ -172,6 +172,67 @@ export function githubAuthBackendTuneToTerraform(struct?: GithubAuthBackendTune } } + +export function githubAuthBackendTuneToHclTerraform(struct?: GithubAuthBackendTune | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + allowed_response_headers: { + value: struct!.allowedResponseHeaders === undefined ? null : cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.allowedResponseHeaders), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + audit_non_hmac_request_keys: { + value: struct!.auditNonHmacRequestKeys === undefined ? null : cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.auditNonHmacRequestKeys), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + audit_non_hmac_response_keys: { + value: struct!.auditNonHmacResponseKeys === undefined ? null : cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.auditNonHmacResponseKeys), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + default_lease_ttl: { + value: struct!.defaultLeaseTtl === undefined ? null : cdktf.stringToHclTerraform(struct!.defaultLeaseTtl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + listing_visibility: { + value: struct!.listingVisibility === undefined ? null : cdktf.stringToHclTerraform(struct!.listingVisibility), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_lease_ttl: { + value: struct!.maxLeaseTtl === undefined ? null : cdktf.stringToHclTerraform(struct!.maxLeaseTtl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + passthrough_request_headers: { + value: struct!.passthroughRequestHeaders === undefined ? null : cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.passthroughRequestHeaders), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + token_type: { + value: struct!.tokenType === undefined ? null : cdktf.stringToHclTerraform(struct!.tokenType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class GithubAuthBackendTuneOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -798,4 +859,120 @@ export class GithubAuthBackend extends cdktf.TerraformResource { tune: cdktf.listMapper(githubAuthBackendTuneToTerraform, false)(this._tune.internalValue), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + base_url: { + value: cdktf.stringToHclTerraform(this._baseUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + description: { + value: cdktf.stringToHclTerraform(this._description), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disable_remount: { + value: cdktf.booleanToHclTerraform(this._disableRemount), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + organization: { + value: cdktf.stringToHclTerraform(this._organization), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + organization_id: { + value: cdktf.numberToHclTerraform(this._organizationId), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + token_bound_cidrs: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenBoundCidrs), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_explicit_max_ttl: { + value: cdktf.numberToHclTerraform(this._tokenExplicitMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_max_ttl: { + value: cdktf.numberToHclTerraform(this._tokenMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_no_default_policy: { + value: cdktf.booleanToHclTerraform(this._tokenNoDefaultPolicy), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + token_num_uses: { + value: cdktf.numberToHclTerraform(this._tokenNumUses), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_period: { + value: cdktf.numberToHclTerraform(this._tokenPeriod), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenPolicies), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_ttl: { + value: cdktf.numberToHclTerraform(this._tokenTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_type: { + value: cdktf.stringToHclTerraform(this._tokenType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + tune: { + value: cdktf.listMapperHcl(githubAuthBackendTuneToHclTerraform, false)(this._tune.internalValue), + isBlock: true, + type: "set", + storageClassType: "GithubAuthBackendTuneList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/github-team/README.md b/src/github-team/README.md index 352ca283..b50ae588 100644 --- a/src/github-team/README.md +++ b/src/github-team/README.md @@ -1,3 +1,3 @@ # `vault_github_team` -Refer to the Terraform Registory for docs: [`vault_github_team`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/github_team). +Refer to the Terraform Registry for docs: [`vault_github_team`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/github_team). diff --git a/src/github-team/index.ts b/src/github-team/index.ts index 1b7f311c..84766090 100644 --- a/src/github-team/index.ts +++ b/src/github-team/index.ts @@ -197,4 +197,42 @@ export class GithubTeam extends cdktf.TerraformResource { team: cdktf.stringToTerraform(this._team), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._policies), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + team: { + value: cdktf.stringToHclTerraform(this._team), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/github-user/README.md b/src/github-user/README.md index 16f185b2..63a87bd5 100644 --- a/src/github-user/README.md +++ b/src/github-user/README.md @@ -1,3 +1,3 @@ # `vault_github_user` -Refer to the Terraform Registory for docs: [`vault_github_user`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/github_user). +Refer to the Terraform Registry for docs: [`vault_github_user`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/github_user). diff --git a/src/github-user/index.ts b/src/github-user/index.ts index e22623d1..d4ab5650 100644 --- a/src/github-user/index.ts +++ b/src/github-user/index.ts @@ -197,4 +197,42 @@ export class GithubUser extends cdktf.TerraformResource { user: cdktf.stringToTerraform(this._user), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._policies), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + user: { + value: cdktf.stringToHclTerraform(this._user), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/identity-entity-alias/README.md b/src/identity-entity-alias/README.md index 72335d6c..f3c440fd 100644 --- a/src/identity-entity-alias/README.md +++ b/src/identity-entity-alias/README.md @@ -1,3 +1,3 @@ # `vault_identity_entity_alias` -Refer to the Terraform Registory for docs: [`vault_identity_entity_alias`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_entity_alias). +Refer to the Terraform Registry for docs: [`vault_identity_entity_alias`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_entity_alias). diff --git a/src/identity-entity-alias/index.ts b/src/identity-entity-alias/index.ts index be6676e8..7ef75808 100644 --- a/src/identity-entity-alias/index.ts +++ b/src/identity-entity-alias/index.ts @@ -215,4 +215,48 @@ export class IdentityEntityAlias extends cdktf.TerraformResource { namespace: cdktf.stringToTerraform(this._namespace), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + canonical_id: { + value: cdktf.stringToHclTerraform(this._canonicalId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + custom_metadata: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(this._customMetadata), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + mount_accessor: { + value: cdktf.stringToHclTerraform(this._mountAccessor), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/identity-entity-policies/README.md b/src/identity-entity-policies/README.md index 6277f714..14fc523e 100644 --- a/src/identity-entity-policies/README.md +++ b/src/identity-entity-policies/README.md @@ -1,3 +1,3 @@ # `vault_identity_entity_policies` -Refer to the Terraform Registory for docs: [`vault_identity_entity_policies`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_entity_policies). +Refer to the Terraform Registry for docs: [`vault_identity_entity_policies`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_entity_policies). diff --git a/src/identity-entity-policies/index.ts b/src/identity-entity-policies/index.ts index 805a83fd..30de0b57 100644 --- a/src/identity-entity-policies/index.ts +++ b/src/identity-entity-policies/index.ts @@ -199,4 +199,42 @@ export class IdentityEntityPolicies extends cdktf.TerraformResource { policies: cdktf.listMapper(cdktf.stringToTerraform, false)(this._policies), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + entity_id: { + value: cdktf.stringToHclTerraform(this._entityId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + exclusive: { + value: cdktf.booleanToHclTerraform(this._exclusive), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._policies), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/identity-entity/README.md b/src/identity-entity/README.md index 953fd9f2..7d1b739f 100644 --- a/src/identity-entity/README.md +++ b/src/identity-entity/README.md @@ -1,3 +1,3 @@ # `vault_identity_entity` -Refer to the Terraform Registory for docs: [`vault_identity_entity`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_entity). +Refer to the Terraform Registry for docs: [`vault_identity_entity`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_entity). diff --git a/src/identity-entity/index.ts b/src/identity-entity/index.ts index b355068f..073763f6 100644 --- a/src/identity-entity/index.ts +++ b/src/identity-entity/index.ts @@ -248,4 +248,54 @@ export class IdentityEntity extends cdktf.TerraformResource { policies: cdktf.listMapper(cdktf.stringToTerraform, false)(this._policies), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + disabled: { + value: cdktf.booleanToHclTerraform(this._disabled), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + external_policies: { + value: cdktf.booleanToHclTerraform(this._externalPolicies), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + metadata: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(this._metadata), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._policies), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/identity-group-alias/README.md b/src/identity-group-alias/README.md index 7dd11623..05fc0c42 100644 --- a/src/identity-group-alias/README.md +++ b/src/identity-group-alias/README.md @@ -1,3 +1,3 @@ # `vault_identity_group_alias` -Refer to the Terraform Registory for docs: [`vault_identity_group_alias`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_group_alias). +Refer to the Terraform Registry for docs: [`vault_identity_group_alias`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_group_alias). diff --git a/src/identity-group-alias/index.ts b/src/identity-group-alias/index.ts index f34734ec..5a65dda1 100644 --- a/src/identity-group-alias/index.ts +++ b/src/identity-group-alias/index.ts @@ -191,4 +191,42 @@ export class IdentityGroupAlias extends cdktf.TerraformResource { namespace: cdktf.stringToTerraform(this._namespace), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + canonical_id: { + value: cdktf.stringToHclTerraform(this._canonicalId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + mount_accessor: { + value: cdktf.stringToHclTerraform(this._mountAccessor), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/identity-group-member-entity-ids/README.md b/src/identity-group-member-entity-ids/README.md index 81b411e5..76320134 100644 --- a/src/identity-group-member-entity-ids/README.md +++ b/src/identity-group-member-entity-ids/README.md @@ -1,3 +1,3 @@ # `vault_identity_group_member_entity_ids` -Refer to the Terraform Registory for docs: [`vault_identity_group_member_entity_ids`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_group_member_entity_ids). +Refer to the Terraform Registry for docs: [`vault_identity_group_member_entity_ids`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_group_member_entity_ids). diff --git a/src/identity-group-member-entity-ids/index.ts b/src/identity-group-member-entity-ids/index.ts index 56b69f9e..be436010 100644 --- a/src/identity-group-member-entity-ids/index.ts +++ b/src/identity-group-member-entity-ids/index.ts @@ -203,4 +203,42 @@ export class IdentityGroupMemberEntityIds extends cdktf.TerraformResource { namespace: cdktf.stringToTerraform(this._namespace), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + exclusive: { + value: cdktf.booleanToHclTerraform(this._exclusive), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + group_id: { + value: cdktf.stringToHclTerraform(this._groupId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + member_entity_ids: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._memberEntityIds), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/identity-group-member-group-ids/README.md b/src/identity-group-member-group-ids/README.md index bb468170..78ee941a 100644 --- a/src/identity-group-member-group-ids/README.md +++ b/src/identity-group-member-group-ids/README.md @@ -1,3 +1,3 @@ # `vault_identity_group_member_group_ids` -Refer to the Terraform Registory for docs: [`vault_identity_group_member_group_ids`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_group_member_group_ids). +Refer to the Terraform Registry for docs: [`vault_identity_group_member_group_ids`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_group_member_group_ids). diff --git a/src/identity-group-member-group-ids/index.ts b/src/identity-group-member-group-ids/index.ts index e7c2f95c..bdf02338 100644 --- a/src/identity-group-member-group-ids/index.ts +++ b/src/identity-group-member-group-ids/index.ts @@ -198,4 +198,42 @@ export class IdentityGroupMemberGroupIds extends cdktf.TerraformResource { namespace: cdktf.stringToTerraform(this._namespace), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + exclusive: { + value: cdktf.booleanToHclTerraform(this._exclusive), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + group_id: { + value: cdktf.stringToHclTerraform(this._groupId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + member_group_ids: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._memberGroupIds), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/identity-group-policies/README.md b/src/identity-group-policies/README.md index d51dc932..ea387b2b 100644 --- a/src/identity-group-policies/README.md +++ b/src/identity-group-policies/README.md @@ -1,3 +1,3 @@ # `vault_identity_group_policies` -Refer to the Terraform Registory for docs: [`vault_identity_group_policies`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_group_policies). +Refer to the Terraform Registry for docs: [`vault_identity_group_policies`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_group_policies). diff --git a/src/identity-group-policies/index.ts b/src/identity-group-policies/index.ts index 6155fa52..6c27aa42 100644 --- a/src/identity-group-policies/index.ts +++ b/src/identity-group-policies/index.ts @@ -199,4 +199,42 @@ export class IdentityGroupPolicies extends cdktf.TerraformResource { policies: cdktf.listMapper(cdktf.stringToTerraform, false)(this._policies), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + exclusive: { + value: cdktf.booleanToHclTerraform(this._exclusive), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + group_id: { + value: cdktf.stringToHclTerraform(this._groupId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._policies), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/identity-group/README.md b/src/identity-group/README.md index 8caca367..f4a1c6a8 100644 --- a/src/identity-group/README.md +++ b/src/identity-group/README.md @@ -1,3 +1,3 @@ # `vault_identity_group` -Refer to the Terraform Registory for docs: [`vault_identity_group`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_group). +Refer to the Terraform Registry for docs: [`vault_identity_group`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_group). diff --git a/src/identity-group/index.ts b/src/identity-group/index.ts index fc4fa161..7939765b 100644 --- a/src/identity-group/index.ts +++ b/src/identity-group/index.ts @@ -344,4 +344,78 @@ export class IdentityGroup extends cdktf.TerraformResource { type: cdktf.stringToTerraform(this._type), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + external_member_entity_ids: { + value: cdktf.booleanToHclTerraform(this._externalMemberEntityIds), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + external_member_group_ids: { + value: cdktf.booleanToHclTerraform(this._externalMemberGroupIds), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + external_policies: { + value: cdktf.booleanToHclTerraform(this._externalPolicies), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + member_entity_ids: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._memberEntityIds), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + member_group_ids: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._memberGroupIds), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + metadata: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(this._metadata), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._policies), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + type: { + value: cdktf.stringToHclTerraform(this._type), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/identity-mfa-duo/README.md b/src/identity-mfa-duo/README.md index 16bfd6d5..1aa5d6ba 100644 --- a/src/identity-mfa-duo/README.md +++ b/src/identity-mfa-duo/README.md @@ -1,3 +1,3 @@ # `vault_identity_mfa_duo` -Refer to the Terraform Registory for docs: [`vault_identity_mfa_duo`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_mfa_duo). +Refer to the Terraform Registry for docs: [`vault_identity_mfa_duo`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_mfa_duo). diff --git a/src/identity-mfa-duo/index.ts b/src/identity-mfa-duo/index.ts index 368b20e6..13d2ba2c 100644 --- a/src/identity-mfa-duo/index.ts +++ b/src/identity-mfa-duo/index.ts @@ -298,4 +298,60 @@ export class IdentityMfaDuo extends cdktf.TerraformResource { username_format: cdktf.stringToTerraform(this._usernameFormat), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + api_hostname: { + value: cdktf.stringToHclTerraform(this._apiHostname), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + integration_key: { + value: cdktf.stringToHclTerraform(this._integrationKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + push_info: { + value: cdktf.stringToHclTerraform(this._pushInfo), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + secret_key: { + value: cdktf.stringToHclTerraform(this._secretKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + use_passcode: { + value: cdktf.booleanToHclTerraform(this._usePasscode), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + username_format: { + value: cdktf.stringToHclTerraform(this._usernameFormat), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/identity-mfa-login-enforcement/README.md b/src/identity-mfa-login-enforcement/README.md index cfa0a1d6..ec2338f6 100644 --- a/src/identity-mfa-login-enforcement/README.md +++ b/src/identity-mfa-login-enforcement/README.md @@ -1,3 +1,3 @@ # `vault_identity_mfa_login_enforcement` -Refer to the Terraform Registory for docs: [`vault_identity_mfa_login_enforcement`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_mfa_login_enforcement). +Refer to the Terraform Registry for docs: [`vault_identity_mfa_login_enforcement`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_mfa_login_enforcement). diff --git a/src/identity-mfa-login-enforcement/index.ts b/src/identity-mfa-login-enforcement/index.ts index ad6ec47e..c5e741e5 100644 --- a/src/identity-mfa-login-enforcement/index.ts +++ b/src/identity-mfa-login-enforcement/index.ts @@ -281,4 +281,60 @@ export class IdentityMfaLoginEnforcement extends cdktf.TerraformResource { namespace: cdktf.stringToTerraform(this._namespace), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + auth_method_accessors: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._authMethodAccessors), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + auth_method_types: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._authMethodTypes), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + identity_entity_ids: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._identityEntityIds), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + identity_group_ids: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._identityGroupIds), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + mfa_method_ids: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._mfaMethodIds), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/identity-mfa-okta/README.md b/src/identity-mfa-okta/README.md index 4a61c11d..640738b3 100644 --- a/src/identity-mfa-okta/README.md +++ b/src/identity-mfa-okta/README.md @@ -1,3 +1,3 @@ # `vault_identity_mfa_okta` -Refer to the Terraform Registory for docs: [`vault_identity_mfa_okta`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_mfa_okta). +Refer to the Terraform Registry for docs: [`vault_identity_mfa_okta`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_mfa_okta). diff --git a/src/identity-mfa-okta/index.ts b/src/identity-mfa-okta/index.ts index 757cb3cd..259ab17a 100644 --- a/src/identity-mfa-okta/index.ts +++ b/src/identity-mfa-okta/index.ts @@ -277,4 +277,54 @@ export class IdentityMfaOkta extends cdktf.TerraformResource { username_format: cdktf.stringToTerraform(this._usernameFormat), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + api_token: { + value: cdktf.stringToHclTerraform(this._apiToken), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + base_url: { + value: cdktf.stringToHclTerraform(this._baseUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + org_name: { + value: cdktf.stringToHclTerraform(this._orgName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + primary_email: { + value: cdktf.booleanToHclTerraform(this._primaryEmail), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + username_format: { + value: cdktf.stringToHclTerraform(this._usernameFormat), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/identity-mfa-pingid/README.md b/src/identity-mfa-pingid/README.md index abc77713..53b35c6b 100644 --- a/src/identity-mfa-pingid/README.md +++ b/src/identity-mfa-pingid/README.md @@ -1,3 +1,3 @@ # `vault_identity_mfa_pingid` -Refer to the Terraform Registory for docs: [`vault_identity_mfa_pingid`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_mfa_pingid). +Refer to the Terraform Registry for docs: [`vault_identity_mfa_pingid`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_mfa_pingid). diff --git a/src/identity-mfa-pingid/index.ts b/src/identity-mfa-pingid/index.ts index 4b441c5c..8e2d0dfd 100644 --- a/src/identity-mfa-pingid/index.ts +++ b/src/identity-mfa-pingid/index.ts @@ -233,4 +233,36 @@ export class IdentityMfaPingid extends cdktf.TerraformResource { username_format: cdktf.stringToTerraform(this._usernameFormat), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + settings_file_base64: { + value: cdktf.stringToHclTerraform(this._settingsFileBase64), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_format: { + value: cdktf.stringToHclTerraform(this._usernameFormat), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/identity-mfa-totp/README.md b/src/identity-mfa-totp/README.md index 44a63d31..39b29281 100644 --- a/src/identity-mfa-totp/README.md +++ b/src/identity-mfa-totp/README.md @@ -1,3 +1,3 @@ # `vault_identity_mfa_totp` -Refer to the Terraform Registory for docs: [`vault_identity_mfa_totp`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_mfa_totp). +Refer to the Terraform Registry for docs: [`vault_identity_mfa_totp`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_mfa_totp). diff --git a/src/identity-mfa-totp/index.ts b/src/identity-mfa-totp/index.ts index eab13e68..ad9d8c61 100644 --- a/src/identity-mfa-totp/index.ts +++ b/src/identity-mfa-totp/index.ts @@ -352,4 +352,72 @@ export class IdentityMfaTotp extends cdktf.TerraformResource { skew: cdktf.numberToTerraform(this._skew), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + algorithm: { + value: cdktf.stringToHclTerraform(this._algorithm), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + digits: { + value: cdktf.numberToHclTerraform(this._digits), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + issuer: { + value: cdktf.stringToHclTerraform(this._issuer), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key_size: { + value: cdktf.numberToHclTerraform(this._keySize), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_validation_attempts: { + value: cdktf.numberToHclTerraform(this._maxValidationAttempts), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + period: { + value: cdktf.numberToHclTerraform(this._period), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + qr_size: { + value: cdktf.numberToHclTerraform(this._qrSize), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + skew: { + value: cdktf.numberToHclTerraform(this._skew), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/identity-oidc-assignment/README.md b/src/identity-oidc-assignment/README.md index 607b9a45..24d44444 100644 --- a/src/identity-oidc-assignment/README.md +++ b/src/identity-oidc-assignment/README.md @@ -1,3 +1,3 @@ # `vault_identity_oidc_assignment` -Refer to the Terraform Registory for docs: [`vault_identity_oidc_assignment`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_oidc_assignment). +Refer to the Terraform Registry for docs: [`vault_identity_oidc_assignment`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_oidc_assignment). diff --git a/src/identity-oidc-assignment/index.ts b/src/identity-oidc-assignment/index.ts index aa57c2f2..393d7cb6 100644 --- a/src/identity-oidc-assignment/index.ts +++ b/src/identity-oidc-assignment/index.ts @@ -197,4 +197,42 @@ export class IdentityOidcAssignment extends cdktf.TerraformResource { namespace: cdktf.stringToTerraform(this._namespace), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + entity_ids: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._entityIds), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + group_ids: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._groupIds), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/identity-oidc-client/README.md b/src/identity-oidc-client/README.md index 3227df2e..5d421cf2 100644 --- a/src/identity-oidc-client/README.md +++ b/src/identity-oidc-client/README.md @@ -1,3 +1,3 @@ # `vault_identity_oidc_client` -Refer to the Terraform Registory for docs: [`vault_identity_oidc_client`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_oidc_client). +Refer to the Terraform Registry for docs: [`vault_identity_oidc_client`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_oidc_client). diff --git a/src/identity-oidc-client/index.ts b/src/identity-oidc-client/index.ts index aefc7603..25833f05 100644 --- a/src/identity-oidc-client/index.ts +++ b/src/identity-oidc-client/index.ts @@ -303,4 +303,66 @@ export class IdentityOidcClient extends cdktf.TerraformResource { redirect_uris: cdktf.listMapper(cdktf.stringToTerraform, false)(this._redirectUris), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + access_token_ttl: { + value: cdktf.numberToHclTerraform(this._accessTokenTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + assignments: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._assignments), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + client_type: { + value: cdktf.stringToHclTerraform(this._clientType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id_token_ttl: { + value: cdktf.numberToHclTerraform(this._idTokenTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + key: { + value: cdktf.stringToHclTerraform(this._key), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + redirect_uris: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._redirectUris), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/identity-oidc-key-allowed-client-id/README.md b/src/identity-oidc-key-allowed-client-id/README.md index 8b9416bb..0b73b1d2 100644 --- a/src/identity-oidc-key-allowed-client-id/README.md +++ b/src/identity-oidc-key-allowed-client-id/README.md @@ -1,3 +1,3 @@ # `vault_identity_oidc_key_allowed_client_id` -Refer to the Terraform Registory for docs: [`vault_identity_oidc_key_allowed_client_id`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_oidc_key_allowed_client_id). +Refer to the Terraform Registry for docs: [`vault_identity_oidc_key_allowed_client_id`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_oidc_key_allowed_client_id). diff --git a/src/identity-oidc-key-allowed-client-id/index.ts b/src/identity-oidc-key-allowed-client-id/index.ts index 468c9ac7..9ef5631d 100644 --- a/src/identity-oidc-key-allowed-client-id/index.ts +++ b/src/identity-oidc-key-allowed-client-id/index.ts @@ -170,4 +170,36 @@ export class IdentityOidcKeyAllowedClientId extends cdktf.TerraformResource { namespace: cdktf.stringToTerraform(this._namespace), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + allowed_client_id: { + value: cdktf.stringToHclTerraform(this._allowedClientId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key_name: { + value: cdktf.stringToHclTerraform(this._keyName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/identity-oidc-key/README.md b/src/identity-oidc-key/README.md index 490c579b..ed8a521b 100644 --- a/src/identity-oidc-key/README.md +++ b/src/identity-oidc-key/README.md @@ -1,3 +1,3 @@ # `vault_identity_oidc_key` -Refer to the Terraform Registory for docs: [`vault_identity_oidc_key`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_oidc_key). +Refer to the Terraform Registry for docs: [`vault_identity_oidc_key`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_oidc_key). diff --git a/src/identity-oidc-key/index.ts b/src/identity-oidc-key/index.ts index adfb4018..b289c99f 100644 --- a/src/identity-oidc-key/index.ts +++ b/src/identity-oidc-key/index.ts @@ -245,4 +245,54 @@ export class IdentityOidcKey extends cdktf.TerraformResource { verification_ttl: cdktf.numberToTerraform(this._verificationTtl), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + algorithm: { + value: cdktf.stringToHclTerraform(this._algorithm), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + allowed_client_ids: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._allowedClientIds), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + rotation_period: { + value: cdktf.numberToHclTerraform(this._rotationPeriod), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + verification_ttl: { + value: cdktf.numberToHclTerraform(this._verificationTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/identity-oidc-provider/README.md b/src/identity-oidc-provider/README.md index 240aea41..6e231a94 100644 --- a/src/identity-oidc-provider/README.md +++ b/src/identity-oidc-provider/README.md @@ -1,3 +1,3 @@ # `vault_identity_oidc_provider` -Refer to the Terraform Registory for docs: [`vault_identity_oidc_provider`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_oidc_provider). +Refer to the Terraform Registry for docs: [`vault_identity_oidc_provider`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_oidc_provider). diff --git a/src/identity-oidc-provider/index.ts b/src/identity-oidc-provider/index.ts index a3d26541..b675eefe 100644 --- a/src/identity-oidc-provider/index.ts +++ b/src/identity-oidc-provider/index.ts @@ -250,4 +250,54 @@ export class IdentityOidcProvider extends cdktf.TerraformResource { scopes_supported: cdktf.listMapper(cdktf.stringToTerraform, false)(this._scopesSupported), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + allowed_client_ids: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._allowedClientIds), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + https_enabled: { + value: cdktf.booleanToHclTerraform(this._httpsEnabled), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + issuer_host: { + value: cdktf.stringToHclTerraform(this._issuerHost), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + scopes_supported: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._scopesSupported), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/identity-oidc-role/README.md b/src/identity-oidc-role/README.md index cab2d18f..8a3d9061 100644 --- a/src/identity-oidc-role/README.md +++ b/src/identity-oidc-role/README.md @@ -1,3 +1,3 @@ # `vault_identity_oidc_role` -Refer to the Terraform Registory for docs: [`vault_identity_oidc_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_oidc_role). +Refer to the Terraform Registry for docs: [`vault_identity_oidc_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_oidc_role). diff --git a/src/identity-oidc-role/index.ts b/src/identity-oidc-role/index.ts index 75bf5d75..ef372b90 100644 --- a/src/identity-oidc-role/index.ts +++ b/src/identity-oidc-role/index.ts @@ -242,4 +242,54 @@ export class IdentityOidcRole extends cdktf.TerraformResource { ttl: cdktf.numberToTerraform(this._ttl), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + client_id: { + value: cdktf.stringToHclTerraform(this._clientId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key: { + value: cdktf.stringToHclTerraform(this._key), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + template: { + value: cdktf.stringToHclTerraform(this._template), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ttl: { + value: cdktf.numberToHclTerraform(this._ttl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/identity-oidc-scope/README.md b/src/identity-oidc-scope/README.md index 3b3ab34e..85d9fcfa 100644 --- a/src/identity-oidc-scope/README.md +++ b/src/identity-oidc-scope/README.md @@ -1,3 +1,3 @@ # `vault_identity_oidc_scope` -Refer to the Terraform Registory for docs: [`vault_identity_oidc_scope`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_oidc_scope). +Refer to the Terraform Registry for docs: [`vault_identity_oidc_scope`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_oidc_scope). diff --git a/src/identity-oidc-scope/index.ts b/src/identity-oidc-scope/index.ts index 60645cc3..c761dd94 100644 --- a/src/identity-oidc-scope/index.ts +++ b/src/identity-oidc-scope/index.ts @@ -197,4 +197,42 @@ export class IdentityOidcScope extends cdktf.TerraformResource { template: cdktf.stringToTerraform(this._template), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + description: { + value: cdktf.stringToHclTerraform(this._description), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + template: { + value: cdktf.stringToHclTerraform(this._template), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/identity-oidc/README.md b/src/identity-oidc/README.md index 8344b143..02780b7d 100644 --- a/src/identity-oidc/README.md +++ b/src/identity-oidc/README.md @@ -1,3 +1,3 @@ # `vault_identity_oidc` -Refer to the Terraform Registory for docs: [`vault_identity_oidc`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_oidc). +Refer to the Terraform Registry for docs: [`vault_identity_oidc`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/identity_oidc). diff --git a/src/identity-oidc/index.ts b/src/identity-oidc/index.ts index e09fa96b..23d35fae 100644 --- a/src/identity-oidc/index.ts +++ b/src/identity-oidc/index.ts @@ -152,4 +152,30 @@ export class IdentityOidc extends cdktf.TerraformResource { namespace: cdktf.stringToTerraform(this._namespace), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + issuer: { + value: cdktf.stringToHclTerraform(this._issuer), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/jwt-auth-backend-role/README.md b/src/jwt-auth-backend-role/README.md index 6280c3bc..a6516870 100644 --- a/src/jwt-auth-backend-role/README.md +++ b/src/jwt-auth-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_jwt_auth_backend_role` -Refer to the Terraform Registory for docs: [`vault_jwt_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/jwt_auth_backend_role). +Refer to the Terraform Registry for docs: [`vault_jwt_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/jwt_auth_backend_role). diff --git a/src/jwt-auth-backend-role/index.ts b/src/jwt-auth-backend-role/index.ts index a3cc5381..49f6fb1c 100644 --- a/src/jwt-auth-backend-role/index.ts +++ b/src/jwt-auth-backend-role/index.ts @@ -794,4 +794,192 @@ export class JwtAuthBackendRole extends cdktf.TerraformResource { verbose_oidc_logging: cdktf.booleanToTerraform(this._verboseOidcLogging), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + allowed_redirect_uris: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._allowedRedirectUris), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + bound_audiences: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._boundAudiences), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + bound_claims: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(this._boundClaims), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + bound_claims_type: { + value: cdktf.stringToHclTerraform(this._boundClaimsType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + bound_subject: { + value: cdktf.stringToHclTerraform(this._boundSubject), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + claim_mappings: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(this._claimMappings), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + clock_skew_leeway: { + value: cdktf.numberToHclTerraform(this._clockSkewLeeway), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + disable_bound_claims_parsing: { + value: cdktf.booleanToHclTerraform(this._disableBoundClaimsParsing), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + expiration_leeway: { + value: cdktf.numberToHclTerraform(this._expirationLeeway), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + groups_claim: { + value: cdktf.stringToHclTerraform(this._groupsClaim), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_age: { + value: cdktf.numberToHclTerraform(this._maxAge), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + not_before_leeway: { + value: cdktf.numberToHclTerraform(this._notBeforeLeeway), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + oidc_scopes: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._oidcScopes), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + role_name: { + value: cdktf.stringToHclTerraform(this._roleName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role_type: { + value: cdktf.stringToHclTerraform(this._roleType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + token_bound_cidrs: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenBoundCidrs), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_explicit_max_ttl: { + value: cdktf.numberToHclTerraform(this._tokenExplicitMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_max_ttl: { + value: cdktf.numberToHclTerraform(this._tokenMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_no_default_policy: { + value: cdktf.booleanToHclTerraform(this._tokenNoDefaultPolicy), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + token_num_uses: { + value: cdktf.numberToHclTerraform(this._tokenNumUses), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_period: { + value: cdktf.numberToHclTerraform(this._tokenPeriod), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenPolicies), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_ttl: { + value: cdktf.numberToHclTerraform(this._tokenTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_type: { + value: cdktf.stringToHclTerraform(this._tokenType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + user_claim: { + value: cdktf.stringToHclTerraform(this._userClaim), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + user_claim_json_pointer: { + value: cdktf.booleanToHclTerraform(this._userClaimJsonPointer), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + verbose_oidc_logging: { + value: cdktf.booleanToHclTerraform(this._verboseOidcLogging), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/jwt-auth-backend/README.md b/src/jwt-auth-backend/README.md index c94db7f2..9ba9fda9 100644 --- a/src/jwt-auth-backend/README.md +++ b/src/jwt-auth-backend/README.md @@ -1,3 +1,3 @@ # `vault_jwt_auth_backend` -Refer to the Terraform Registory for docs: [`vault_jwt_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/jwt_auth_backend). +Refer to the Terraform Registry for docs: [`vault_jwt_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/jwt_auth_backend). diff --git a/src/jwt-auth-backend/index.ts b/src/jwt-auth-backend/index.ts index d04546ff..3e129891 100644 --- a/src/jwt-auth-backend/index.ts +++ b/src/jwt-auth-backend/index.ts @@ -196,6 +196,67 @@ export function jwtAuthBackendTuneToTerraform(struct?: JwtAuthBackendTune | cdkt } } + +export function jwtAuthBackendTuneToHclTerraform(struct?: JwtAuthBackendTune | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + allowed_response_headers: { + value: struct!.allowedResponseHeaders === undefined ? null : cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.allowedResponseHeaders), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + audit_non_hmac_request_keys: { + value: struct!.auditNonHmacRequestKeys === undefined ? null : cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.auditNonHmacRequestKeys), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + audit_non_hmac_response_keys: { + value: struct!.auditNonHmacResponseKeys === undefined ? null : cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.auditNonHmacResponseKeys), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + default_lease_ttl: { + value: struct!.defaultLeaseTtl === undefined ? null : cdktf.stringToHclTerraform(struct!.defaultLeaseTtl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + listing_visibility: { + value: struct!.listingVisibility === undefined ? null : cdktf.stringToHclTerraform(struct!.listingVisibility), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_lease_ttl: { + value: struct!.maxLeaseTtl === undefined ? null : cdktf.stringToHclTerraform(struct!.maxLeaseTtl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + passthrough_request_headers: { + value: struct!.passthroughRequestHeaders === undefined ? null : cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.passthroughRequestHeaders), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + token_type: { + value: struct!.tokenType === undefined ? null : cdktf.stringToHclTerraform(struct!.tokenType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class JwtAuthBackendTuneOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -897,4 +958,144 @@ export class JwtAuthBackend extends cdktf.TerraformResource { type: cdktf.stringToTerraform(this._type), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + bound_issuer: { + value: cdktf.stringToHclTerraform(this._boundIssuer), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + default_role: { + value: cdktf.stringToHclTerraform(this._defaultRole), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + description: { + value: cdktf.stringToHclTerraform(this._description), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disable_remount: { + value: cdktf.booleanToHclTerraform(this._disableRemount), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + jwks_ca_pem: { + value: cdktf.stringToHclTerraform(this._jwksCaPem), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + jwks_url: { + value: cdktf.stringToHclTerraform(this._jwksUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + jwt_supported_algs: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._jwtSupportedAlgs), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + jwt_validation_pubkeys: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._jwtValidationPubkeys), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + local: { + value: cdktf.booleanToHclTerraform(this._local), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace_in_state: { + value: cdktf.booleanToHclTerraform(this._namespaceInState), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + oidc_client_id: { + value: cdktf.stringToHclTerraform(this._oidcClientId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + oidc_client_secret: { + value: cdktf.stringToHclTerraform(this._oidcClientSecret), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + oidc_discovery_ca_pem: { + value: cdktf.stringToHclTerraform(this._oidcDiscoveryCaPem), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + oidc_discovery_url: { + value: cdktf.stringToHclTerraform(this._oidcDiscoveryUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + oidc_response_mode: { + value: cdktf.stringToHclTerraform(this._oidcResponseMode), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + oidc_response_types: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._oidcResponseTypes), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + provider_config: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(this._providerConfig), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + tune: { + value: cdktf.listMapperHcl(jwtAuthBackendTuneToHclTerraform, false)(this._tune.internalValue), + isBlock: true, + type: "set", + storageClassType: "JwtAuthBackendTuneList", + }, + type: { + value: cdktf.stringToHclTerraform(this._type), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/kmip-secret-backend/README.md b/src/kmip-secret-backend/README.md index 55733a43..1861099b 100644 --- a/src/kmip-secret-backend/README.md +++ b/src/kmip-secret-backend/README.md @@ -1,3 +1,3 @@ # `vault_kmip_secret_backend` -Refer to the Terraform Registory for docs: [`vault_kmip_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/kmip_secret_backend). +Refer to the Terraform Registry for docs: [`vault_kmip_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/kmip_secret_backend). diff --git a/src/kmip-secret-backend/index.ts b/src/kmip-secret-backend/index.ts index 8ba0421e..4d41caf5 100644 --- a/src/kmip-secret-backend/index.ts +++ b/src/kmip-secret-backend/index.ts @@ -413,4 +413,96 @@ export class KmipSecretBackend extends cdktf.TerraformResource { tls_min_version: cdktf.stringToTerraform(this._tlsMinVersion), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + default_tls_client_key_bits: { + value: cdktf.numberToHclTerraform(this._defaultTlsClientKeyBits), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + default_tls_client_key_type: { + value: cdktf.stringToHclTerraform(this._defaultTlsClientKeyType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + default_tls_client_ttl: { + value: cdktf.numberToHclTerraform(this._defaultTlsClientTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + description: { + value: cdktf.stringToHclTerraform(this._description), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disable_remount: { + value: cdktf.booleanToHclTerraform(this._disableRemount), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + listen_addrs: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._listenAddrs), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + server_hostnames: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._serverHostnames), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + server_ips: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._serverIps), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + tls_ca_key_bits: { + value: cdktf.numberToHclTerraform(this._tlsCaKeyBits), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + tls_ca_key_type: { + value: cdktf.stringToHclTerraform(this._tlsCaKeyType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + tls_min_version: { + value: cdktf.stringToHclTerraform(this._tlsMinVersion), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/kmip-secret-role/README.md b/src/kmip-secret-role/README.md index 58935522..35d46014 100644 --- a/src/kmip-secret-role/README.md +++ b/src/kmip-secret-role/README.md @@ -1,3 +1,3 @@ # `vault_kmip_secret_role` -Refer to the Terraform Registory for docs: [`vault_kmip_secret_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/kmip_secret_role). +Refer to the Terraform Registry for docs: [`vault_kmip_secret_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/kmip_secret_role). diff --git a/src/kmip-secret-role/index.ts b/src/kmip-secret-role/index.ts index db51b46d..976aba9b 100644 --- a/src/kmip-secret-role/index.ts +++ b/src/kmip-secret-role/index.ts @@ -599,4 +599,144 @@ export class KmipSecretRole extends cdktf.TerraformResource { tls_client_ttl: cdktf.numberToTerraform(this._tlsClientTtl), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + operation_activate: { + value: cdktf.booleanToHclTerraform(this._operationActivate), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + operation_add_attribute: { + value: cdktf.booleanToHclTerraform(this._operationAddAttribute), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + operation_all: { + value: cdktf.booleanToHclTerraform(this._operationAll), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + operation_create: { + value: cdktf.booleanToHclTerraform(this._operationCreate), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + operation_destroy: { + value: cdktf.booleanToHclTerraform(this._operationDestroy), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + operation_discover_versions: { + value: cdktf.booleanToHclTerraform(this._operationDiscoverVersions), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + operation_get: { + value: cdktf.booleanToHclTerraform(this._operationGet), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + operation_get_attribute_list: { + value: cdktf.booleanToHclTerraform(this._operationGetAttributeList), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + operation_get_attributes: { + value: cdktf.booleanToHclTerraform(this._operationGetAttributes), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + operation_locate: { + value: cdktf.booleanToHclTerraform(this._operationLocate), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + operation_none: { + value: cdktf.booleanToHclTerraform(this._operationNone), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + operation_register: { + value: cdktf.booleanToHclTerraform(this._operationRegister), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + operation_rekey: { + value: cdktf.booleanToHclTerraform(this._operationRekey), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + operation_revoke: { + value: cdktf.booleanToHclTerraform(this._operationRevoke), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role: { + value: cdktf.stringToHclTerraform(this._role), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + scope: { + value: cdktf.stringToHclTerraform(this._scope), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + tls_client_key_bits: { + value: cdktf.numberToHclTerraform(this._tlsClientKeyBits), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + tls_client_key_type: { + value: cdktf.stringToHclTerraform(this._tlsClientKeyType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + tls_client_ttl: { + value: cdktf.numberToHclTerraform(this._tlsClientTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/kmip-secret-scope/README.md b/src/kmip-secret-scope/README.md index 8d2cb5aa..078b4ac8 100644 --- a/src/kmip-secret-scope/README.md +++ b/src/kmip-secret-scope/README.md @@ -1,3 +1,3 @@ # `vault_kmip_secret_scope` -Refer to the Terraform Registory for docs: [`vault_kmip_secret_scope`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/kmip_secret_scope). +Refer to the Terraform Registry for docs: [`vault_kmip_secret_scope`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/kmip_secret_scope). diff --git a/src/kmip-secret-scope/index.ts b/src/kmip-secret-scope/index.ts index 6f1d0f73..daeab348 100644 --- a/src/kmip-secret-scope/index.ts +++ b/src/kmip-secret-scope/index.ts @@ -194,4 +194,42 @@ export class KmipSecretScope extends cdktf.TerraformResource { scope: cdktf.stringToTerraform(this._scope), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + force: { + value: cdktf.booleanToHclTerraform(this._force), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + scope: { + value: cdktf.stringToHclTerraform(this._scope), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/kubernetes-auth-backend-config/README.md b/src/kubernetes-auth-backend-config/README.md index b90558fb..7106488a 100644 --- a/src/kubernetes-auth-backend-config/README.md +++ b/src/kubernetes-auth-backend-config/README.md @@ -1,3 +1,3 @@ # `vault_kubernetes_auth_backend_config` -Refer to the Terraform Registory for docs: [`vault_kubernetes_auth_backend_config`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/kubernetes_auth_backend_config). +Refer to the Terraform Registry for docs: [`vault_kubernetes_auth_backend_config`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/kubernetes_auth_backend_config). diff --git a/src/kubernetes-auth-backend-config/index.ts b/src/kubernetes-auth-backend-config/index.ts index ce1f1f8c..a0367731 100644 --- a/src/kubernetes-auth-backend-config/index.ts +++ b/src/kubernetes-auth-backend-config/index.ts @@ -317,4 +317,72 @@ export class KubernetesAuthBackendConfig extends cdktf.TerraformResource { token_reviewer_jwt: cdktf.stringToTerraform(this._tokenReviewerJwt), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disable_iss_validation: { + value: cdktf.booleanToHclTerraform(this._disableIssValidation), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + disable_local_ca_jwt: { + value: cdktf.booleanToHclTerraform(this._disableLocalCaJwt), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + issuer: { + value: cdktf.stringToHclTerraform(this._issuer), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + kubernetes_ca_cert: { + value: cdktf.stringToHclTerraform(this._kubernetesCaCert), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + kubernetes_host: { + value: cdktf.stringToHclTerraform(this._kubernetesHost), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + pem_keys: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._pemKeys), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + token_reviewer_jwt: { + value: cdktf.stringToHclTerraform(this._tokenReviewerJwt), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/kubernetes-auth-backend-role/README.md b/src/kubernetes-auth-backend-role/README.md index 697353e3..64d01f0c 100644 --- a/src/kubernetes-auth-backend-role/README.md +++ b/src/kubernetes-auth-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_kubernetes_auth_backend_role` -Refer to the Terraform Registory for docs: [`vault_kubernetes_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/kubernetes_auth_backend_role). +Refer to the Terraform Registry for docs: [`vault_kubernetes_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/kubernetes_auth_backend_role). diff --git a/src/kubernetes-auth-backend-role/index.ts b/src/kubernetes-auth-backend-role/index.ts index 8efdcb0b..78c43b8c 100644 --- a/src/kubernetes-auth-backend-role/index.ts +++ b/src/kubernetes-auth-backend-role/index.ts @@ -479,4 +479,114 @@ export class KubernetesAuthBackendRole extends cdktf.TerraformResource { token_type: cdktf.stringToTerraform(this._tokenType), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + alias_name_source: { + value: cdktf.stringToHclTerraform(this._aliasNameSource), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + audience: { + value: cdktf.stringToHclTerraform(this._audience), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + bound_service_account_names: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._boundServiceAccountNames), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + bound_service_account_namespaces: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._boundServiceAccountNamespaces), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role_name: { + value: cdktf.stringToHclTerraform(this._roleName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + token_bound_cidrs: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenBoundCidrs), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_explicit_max_ttl: { + value: cdktf.numberToHclTerraform(this._tokenExplicitMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_max_ttl: { + value: cdktf.numberToHclTerraform(this._tokenMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_no_default_policy: { + value: cdktf.booleanToHclTerraform(this._tokenNoDefaultPolicy), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + token_num_uses: { + value: cdktf.numberToHclTerraform(this._tokenNumUses), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_period: { + value: cdktf.numberToHclTerraform(this._tokenPeriod), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenPolicies), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_ttl: { + value: cdktf.numberToHclTerraform(this._tokenTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_type: { + value: cdktf.stringToHclTerraform(this._tokenType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/kubernetes-secret-backend-role/README.md b/src/kubernetes-secret-backend-role/README.md index 54ee77ff..2997bf8d 100644 --- a/src/kubernetes-secret-backend-role/README.md +++ b/src/kubernetes-secret-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_kubernetes_secret_backend_role` -Refer to the Terraform Registory for docs: [`vault_kubernetes_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/kubernetes_secret_backend_role). +Refer to the Terraform Registry for docs: [`vault_kubernetes_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/kubernetes_secret_backend_role). diff --git a/src/kubernetes-secret-backend-role/index.ts b/src/kubernetes-secret-backend-role/index.ts index 1a228e3b..92685baa 100644 --- a/src/kubernetes-secret-backend-role/index.ts +++ b/src/kubernetes-secret-backend-role/index.ts @@ -407,4 +407,96 @@ export class KubernetesSecretBackendRole extends cdktf.TerraformResource { token_max_ttl: cdktf.numberToTerraform(this._tokenMaxTtl), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + allowed_kubernetes_namespaces: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._allowedKubernetesNamespaces), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + extra_annotations: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(this._extraAnnotations), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + extra_labels: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(this._extraLabels), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + generated_role_rules: { + value: cdktf.stringToHclTerraform(this._generatedRoleRules), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + kubernetes_role_name: { + value: cdktf.stringToHclTerraform(this._kubernetesRoleName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + kubernetes_role_type: { + value: cdktf.stringToHclTerraform(this._kubernetesRoleType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name_template: { + value: cdktf.stringToHclTerraform(this._nameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + service_account_name: { + value: cdktf.stringToHclTerraform(this._serviceAccountName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + token_default_ttl: { + value: cdktf.numberToHclTerraform(this._tokenDefaultTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_max_ttl: { + value: cdktf.numberToHclTerraform(this._tokenMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/kubernetes-secret-backend/README.md b/src/kubernetes-secret-backend/README.md index ffddbcfc..99e1452d 100644 --- a/src/kubernetes-secret-backend/README.md +++ b/src/kubernetes-secret-backend/README.md @@ -1,3 +1,3 @@ # `vault_kubernetes_secret_backend` -Refer to the Terraform Registory for docs: [`vault_kubernetes_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/kubernetes_secret_backend). +Refer to the Terraform Registry for docs: [`vault_kubernetes_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/kubernetes_secret_backend). diff --git a/src/kubernetes-secret-backend/index.ts b/src/kubernetes-secret-backend/index.ts index 504e5e09..a2c6b15e 100644 --- a/src/kubernetes-secret-backend/index.ts +++ b/src/kubernetes-secret-backend/index.ts @@ -490,4 +490,114 @@ export class KubernetesSecretBackend extends cdktf.TerraformResource { service_account_jwt: cdktf.stringToTerraform(this._serviceAccountJwt), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + allowed_managed_keys: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._allowedManagedKeys), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + audit_non_hmac_request_keys: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._auditNonHmacRequestKeys), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + audit_non_hmac_response_keys: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._auditNonHmacResponseKeys), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + default_lease_ttl_seconds: { + value: cdktf.numberToHclTerraform(this._defaultLeaseTtlSeconds), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + description: { + value: cdktf.stringToHclTerraform(this._description), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disable_local_ca_jwt: { + value: cdktf.booleanToHclTerraform(this._disableLocalCaJwt), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + external_entropy_access: { + value: cdktf.booleanToHclTerraform(this._externalEntropyAccess), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + kubernetes_ca_cert: { + value: cdktf.stringToHclTerraform(this._kubernetesCaCert), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + kubernetes_host: { + value: cdktf.stringToHclTerraform(this._kubernetesHost), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + local: { + value: cdktf.booleanToHclTerraform(this._local), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + max_lease_ttl_seconds: { + value: cdktf.numberToHclTerraform(this._maxLeaseTtlSeconds), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + options: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(this._options), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + seal_wrap: { + value: cdktf.booleanToHclTerraform(this._sealWrap), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + service_account_jwt: { + value: cdktf.stringToHclTerraform(this._serviceAccountJwt), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/kv-secret-backend-v2/README.md b/src/kv-secret-backend-v2/README.md index cb86caea..fbb64522 100644 --- a/src/kv-secret-backend-v2/README.md +++ b/src/kv-secret-backend-v2/README.md @@ -1,3 +1,3 @@ # `vault_kv_secret_backend_v2` -Refer to the Terraform Registory for docs: [`vault_kv_secret_backend_v2`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/kv_secret_backend_v2). +Refer to the Terraform Registry for docs: [`vault_kv_secret_backend_v2`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/kv_secret_backend_v2). diff --git a/src/kv-secret-backend-v2/index.ts b/src/kv-secret-backend-v2/index.ts index c6a204a8..7c9bcbd0 100644 --- a/src/kv-secret-backend-v2/index.ts +++ b/src/kv-secret-backend-v2/index.ts @@ -221,4 +221,48 @@ export class KvSecretBackendV2 extends cdktf.TerraformResource { namespace: cdktf.stringToTerraform(this._namespace), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + cas_required: { + value: cdktf.booleanToHclTerraform(this._casRequired), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + delete_version_after: { + value: cdktf.numberToHclTerraform(this._deleteVersionAfter), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_versions: { + value: cdktf.numberToHclTerraform(this._maxVersions), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + mount: { + value: cdktf.stringToHclTerraform(this._mount), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/kv-secret-v2/README.md b/src/kv-secret-v2/README.md index 32150149..4ddf39e1 100644 --- a/src/kv-secret-v2/README.md +++ b/src/kv-secret-v2/README.md @@ -1,3 +1,3 @@ # `vault_kv_secret_v2` -Refer to the Terraform Registory for docs: [`vault_kv_secret_v2`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/kv_secret_v2). +Refer to the Terraform Registry for docs: [`vault_kv_secret_v2`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/kv_secret_v2). diff --git a/src/kv-secret-v2/index.ts b/src/kv-secret-v2/index.ts index 464d06bc..127f77ee 100644 --- a/src/kv-secret-v2/index.ts +++ b/src/kv-secret-v2/index.ts @@ -114,6 +114,43 @@ export function kvSecretV2CustomMetadataToTerraform(struct?: KvSecretV2CustomMet } } + +export function kvSecretV2CustomMetadataToHclTerraform(struct?: KvSecretV2CustomMetadataOutputReference | KvSecretV2CustomMetadata): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + cas_required: { + value: cdktf.booleanToHclTerraform(struct!.casRequired), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + data: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(struct!.data), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + delete_version_after: { + value: cdktf.numberToHclTerraform(struct!.deleteVersionAfter), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_versions: { + value: cdktf.numberToHclTerraform(struct!.maxVersions), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class KvSecretV2CustomMetadataOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; @@ -482,4 +519,72 @@ export class KvSecretV2 extends cdktf.TerraformResource { custom_metadata: kvSecretV2CustomMetadataToTerraform(this._customMetadata.internalValue), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + cas: { + value: cdktf.numberToHclTerraform(this._cas), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + data_json: { + value: cdktf.stringToHclTerraform(this._dataJson), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + delete_all_versions: { + value: cdktf.booleanToHclTerraform(this._deleteAllVersions), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + disable_read: { + value: cdktf.booleanToHclTerraform(this._disableRead), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + mount: { + value: cdktf.stringToHclTerraform(this._mount), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + options: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(this._options), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + custom_metadata: { + value: kvSecretV2CustomMetadataToHclTerraform(this._customMetadata.internalValue), + isBlock: true, + type: "list", + storageClassType: "KvSecretV2CustomMetadataList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/kv-secret/README.md b/src/kv-secret/README.md index 1f2539a5..8c992cf0 100644 --- a/src/kv-secret/README.md +++ b/src/kv-secret/README.md @@ -1,3 +1,3 @@ # `vault_kv_secret` -Refer to the Terraform Registory for docs: [`vault_kv_secret`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/kv_secret). +Refer to the Terraform Registry for docs: [`vault_kv_secret`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/kv_secret). diff --git a/src/kv-secret/index.ts b/src/kv-secret/index.ts index a219ee94..ff7ef5b0 100644 --- a/src/kv-secret/index.ts +++ b/src/kv-secret/index.ts @@ -176,4 +176,36 @@ export class KvSecret extends cdktf.TerraformResource { path: cdktf.stringToTerraform(this._path), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + data_json: { + value: cdktf.stringToHclTerraform(this._dataJson), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/ldap-auth-backend-group/README.md b/src/ldap-auth-backend-group/README.md index f4461049..5e982838 100644 --- a/src/ldap-auth-backend-group/README.md +++ b/src/ldap-auth-backend-group/README.md @@ -1,3 +1,3 @@ # `vault_ldap_auth_backend_group` -Refer to the Terraform Registory for docs: [`vault_ldap_auth_backend_group`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/ldap_auth_backend_group). +Refer to the Terraform Registry for docs: [`vault_ldap_auth_backend_group`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/ldap_auth_backend_group). diff --git a/src/ldap-auth-backend-group/index.ts b/src/ldap-auth-backend-group/index.ts index cf68233f..b945c460 100644 --- a/src/ldap-auth-backend-group/index.ts +++ b/src/ldap-auth-backend-group/index.ts @@ -191,4 +191,42 @@ export class LdapAuthBackendGroup extends cdktf.TerraformResource { policies: cdktf.listMapper(cdktf.stringToTerraform, false)(this._policies), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + groupname: { + value: cdktf.stringToHclTerraform(this._groupname), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._policies), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/ldap-auth-backend-user/README.md b/src/ldap-auth-backend-user/README.md index 2f1b97ba..38de4e42 100644 --- a/src/ldap-auth-backend-user/README.md +++ b/src/ldap-auth-backend-user/README.md @@ -1,3 +1,3 @@ # `vault_ldap_auth_backend_user` -Refer to the Terraform Registory for docs: [`vault_ldap_auth_backend_user`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/ldap_auth_backend_user). +Refer to the Terraform Registry for docs: [`vault_ldap_auth_backend_user`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/ldap_auth_backend_user). diff --git a/src/ldap-auth-backend-user/index.ts b/src/ldap-auth-backend-user/index.ts index 4098cb12..a77d4df1 100644 --- a/src/ldap-auth-backend-user/index.ts +++ b/src/ldap-auth-backend-user/index.ts @@ -213,4 +213,48 @@ export class LdapAuthBackendUser extends cdktf.TerraformResource { username: cdktf.stringToTerraform(this._username), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + groups: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._groups), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._policies), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + username: { + value: cdktf.stringToHclTerraform(this._username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/ldap-auth-backend/README.md b/src/ldap-auth-backend/README.md index 8f5d3714..289f4070 100644 --- a/src/ldap-auth-backend/README.md +++ b/src/ldap-auth-backend/README.md @@ -1,3 +1,3 @@ # `vault_ldap_auth_backend` -Refer to the Terraform Registory for docs: [`vault_ldap_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/ldap_auth_backend). +Refer to the Terraform Registry for docs: [`vault_ldap_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/ldap_auth_backend). diff --git a/src/ldap-auth-backend/index.ts b/src/ldap-auth-backend/index.ts index 6e99f8de..7281c944 100644 --- a/src/ldap-auth-backend/index.ts +++ b/src/ldap-auth-backend/index.ts @@ -946,4 +946,240 @@ export class LdapAuthBackend extends cdktf.TerraformResource { username_as_alias: cdktf.booleanToTerraform(this._usernameAsAlias), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + binddn: { + value: cdktf.stringToHclTerraform(this._binddn), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + bindpass: { + value: cdktf.stringToHclTerraform(this._bindpass), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + case_sensitive_names: { + value: cdktf.booleanToHclTerraform(this._caseSensitiveNames), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + certificate: { + value: cdktf.stringToHclTerraform(this._certificate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + client_tls_cert: { + value: cdktf.stringToHclTerraform(this._clientTlsCert), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + client_tls_key: { + value: cdktf.stringToHclTerraform(this._clientTlsKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + deny_null_bind: { + value: cdktf.booleanToHclTerraform(this._denyNullBind), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + description: { + value: cdktf.stringToHclTerraform(this._description), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disable_remount: { + value: cdktf.booleanToHclTerraform(this._disableRemount), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + discoverdn: { + value: cdktf.booleanToHclTerraform(this._discoverdn), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + groupattr: { + value: cdktf.stringToHclTerraform(this._groupattr), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + groupdn: { + value: cdktf.stringToHclTerraform(this._groupdn), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + groupfilter: { + value: cdktf.stringToHclTerraform(this._groupfilter), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + insecure_tls: { + value: cdktf.booleanToHclTerraform(this._insecureTls), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + local: { + value: cdktf.booleanToHclTerraform(this._local), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + max_page_size: { + value: cdktf.numberToHclTerraform(this._maxPageSize), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + starttls: { + value: cdktf.booleanToHclTerraform(this._starttls), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + tls_max_version: { + value: cdktf.stringToHclTerraform(this._tlsMaxVersion), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + tls_min_version: { + value: cdktf.stringToHclTerraform(this._tlsMinVersion), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + token_bound_cidrs: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenBoundCidrs), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_explicit_max_ttl: { + value: cdktf.numberToHclTerraform(this._tokenExplicitMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_max_ttl: { + value: cdktf.numberToHclTerraform(this._tokenMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_no_default_policy: { + value: cdktf.booleanToHclTerraform(this._tokenNoDefaultPolicy), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + token_num_uses: { + value: cdktf.numberToHclTerraform(this._tokenNumUses), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_period: { + value: cdktf.numberToHclTerraform(this._tokenPeriod), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenPolicies), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_ttl: { + value: cdktf.numberToHclTerraform(this._tokenTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_type: { + value: cdktf.stringToHclTerraform(this._tokenType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + upndomain: { + value: cdktf.stringToHclTerraform(this._upndomain), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + url: { + value: cdktf.stringToHclTerraform(this._url), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + use_token_groups: { + value: cdktf.booleanToHclTerraform(this._useTokenGroups), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + userattr: { + value: cdktf.stringToHclTerraform(this._userattr), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + userdn: { + value: cdktf.stringToHclTerraform(this._userdn), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + userfilter: { + value: cdktf.stringToHclTerraform(this._userfilter), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_as_alias: { + value: cdktf.booleanToHclTerraform(this._usernameAsAlias), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/ldap-secret-backend-dynamic-role/README.md b/src/ldap-secret-backend-dynamic-role/README.md index 05bc3f0d..abf2e819 100644 --- a/src/ldap-secret-backend-dynamic-role/README.md +++ b/src/ldap-secret-backend-dynamic-role/README.md @@ -1,3 +1,3 @@ # `vault_ldap_secret_backend_dynamic_role` -Refer to the Terraform Registory for docs: [`vault_ldap_secret_backend_dynamic_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/ldap_secret_backend_dynamic_role). +Refer to the Terraform Registry for docs: [`vault_ldap_secret_backend_dynamic_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/ldap_secret_backend_dynamic_role). diff --git a/src/ldap-secret-backend-dynamic-role/index.ts b/src/ldap-secret-backend-dynamic-role/index.ts index 6077d425..0ae96696 100644 --- a/src/ldap-secret-backend-dynamic-role/index.ts +++ b/src/ldap-secret-backend-dynamic-role/index.ts @@ -311,4 +311,72 @@ export class LdapSecretBackendDynamicRole extends cdktf.TerraformResource { username_template: cdktf.stringToTerraform(this._usernameTemplate), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + creation_ldif: { + value: cdktf.stringToHclTerraform(this._creationLdif), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + default_ttl: { + value: cdktf.numberToHclTerraform(this._defaultTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + deletion_ldif: { + value: cdktf.stringToHclTerraform(this._deletionLdif), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_ttl: { + value: cdktf.numberToHclTerraform(this._maxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + mount: { + value: cdktf.stringToHclTerraform(this._mount), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role_name: { + value: cdktf.stringToHclTerraform(this._roleName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + rollback_ldif: { + value: cdktf.stringToHclTerraform(this._rollbackLdif), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_template: { + value: cdktf.stringToHclTerraform(this._usernameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/ldap-secret-backend-library-set/README.md b/src/ldap-secret-backend-library-set/README.md index 89b16441..11fe96e1 100644 --- a/src/ldap-secret-backend-library-set/README.md +++ b/src/ldap-secret-backend-library-set/README.md @@ -1,3 +1,3 @@ # `vault_ldap_secret_backend_library_set` -Refer to the Terraform Registory for docs: [`vault_ldap_secret_backend_library_set`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/ldap_secret_backend_library_set). +Refer to the Terraform Registry for docs: [`vault_ldap_secret_backend_library_set`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/ldap_secret_backend_library_set). diff --git a/src/ldap-secret-backend-library-set/index.ts b/src/ldap-secret-backend-library-set/index.ts index fcc4fe7f..f289cb52 100644 --- a/src/ldap-secret-backend-library-set/index.ts +++ b/src/ldap-secret-backend-library-set/index.ts @@ -266,4 +266,60 @@ export class LdapSecretBackendLibrarySet extends cdktf.TerraformResource { ttl: cdktf.numberToTerraform(this._ttl), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + disable_check_in_enforcement: { + value: cdktf.booleanToHclTerraform(this._disableCheckInEnforcement), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_ttl: { + value: cdktf.numberToHclTerraform(this._maxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + mount: { + value: cdktf.stringToHclTerraform(this._mount), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + service_account_names: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._serviceAccountNames), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + ttl: { + value: cdktf.numberToHclTerraform(this._ttl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/ldap-secret-backend-static-role/README.md b/src/ldap-secret-backend-static-role/README.md index deff664f..14d5c0f4 100644 --- a/src/ldap-secret-backend-static-role/README.md +++ b/src/ldap-secret-backend-static-role/README.md @@ -1,3 +1,3 @@ # `vault_ldap_secret_backend_static_role` -Refer to the Terraform Registory for docs: [`vault_ldap_secret_backend_static_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/ldap_secret_backend_static_role). +Refer to the Terraform Registry for docs: [`vault_ldap_secret_backend_static_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/ldap_secret_backend_static_role). diff --git a/src/ldap-secret-backend-static-role/index.ts b/src/ldap-secret-backend-static-role/index.ts index c1133857..e5eb507c 100644 --- a/src/ldap-secret-backend-static-role/index.ts +++ b/src/ldap-secret-backend-static-role/index.ts @@ -239,4 +239,54 @@ export class LdapSecretBackendStaticRole extends cdktf.TerraformResource { username: cdktf.stringToTerraform(this._username), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + dn: { + value: cdktf.stringToHclTerraform(this._dn), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + mount: { + value: cdktf.stringToHclTerraform(this._mount), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role_name: { + value: cdktf.stringToHclTerraform(this._roleName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + rotation_period: { + value: cdktf.numberToHclTerraform(this._rotationPeriod), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + username: { + value: cdktf.stringToHclTerraform(this._username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/ldap-secret-backend/README.md b/src/ldap-secret-backend/README.md index 82f5f86b..64b633fa 100644 --- a/src/ldap-secret-backend/README.md +++ b/src/ldap-secret-backend/README.md @@ -1,3 +1,3 @@ # `vault_ldap_secret_backend` -Refer to the Terraform Registory for docs: [`vault_ldap_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/ldap_secret_backend). +Refer to the Terraform Registry for docs: [`vault_ldap_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/ldap_secret_backend). diff --git a/src/ldap-secret-backend/index.ts b/src/ldap-secret-backend/index.ts index feada2f1..d69ead5e 100644 --- a/src/ldap-secret-backend/index.ts +++ b/src/ldap-secret-backend/index.ts @@ -799,4 +799,192 @@ export class LdapSecretBackend extends cdktf.TerraformResource { userdn: cdktf.stringToTerraform(this._userdn), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + allowed_managed_keys: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._allowedManagedKeys), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + audit_non_hmac_request_keys: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._auditNonHmacRequestKeys), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + audit_non_hmac_response_keys: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._auditNonHmacResponseKeys), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + binddn: { + value: cdktf.stringToHclTerraform(this._binddn), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + bindpass: { + value: cdktf.stringToHclTerraform(this._bindpass), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + certificate: { + value: cdktf.stringToHclTerraform(this._certificate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + client_tls_cert: { + value: cdktf.stringToHclTerraform(this._clientTlsCert), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + client_tls_key: { + value: cdktf.stringToHclTerraform(this._clientTlsKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + connection_timeout: { + value: cdktf.numberToHclTerraform(this._connectionTimeout), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + default_lease_ttl_seconds: { + value: cdktf.numberToHclTerraform(this._defaultLeaseTtlSeconds), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + description: { + value: cdktf.stringToHclTerraform(this._description), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disable_remount: { + value: cdktf.booleanToHclTerraform(this._disableRemount), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + external_entropy_access: { + value: cdktf.booleanToHclTerraform(this._externalEntropyAccess), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + insecure_tls: { + value: cdktf.booleanToHclTerraform(this._insecureTls), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + length: { + value: cdktf.numberToHclTerraform(this._length), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + local: { + value: cdktf.booleanToHclTerraform(this._local), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + max_lease_ttl_seconds: { + value: cdktf.numberToHclTerraform(this._maxLeaseTtlSeconds), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + options: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(this._options), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + password_policy: { + value: cdktf.stringToHclTerraform(this._passwordPolicy), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + request_timeout: { + value: cdktf.numberToHclTerraform(this._requestTimeout), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + schema: { + value: cdktf.stringToHclTerraform(this._schema), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + seal_wrap: { + value: cdktf.booleanToHclTerraform(this._sealWrap), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + starttls: { + value: cdktf.booleanToHclTerraform(this._starttls), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + upndomain: { + value: cdktf.stringToHclTerraform(this._upndomain), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + url: { + value: cdktf.stringToHclTerraform(this._url), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + userattr: { + value: cdktf.stringToHclTerraform(this._userattr), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + userdn: { + value: cdktf.stringToHclTerraform(this._userdn), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/managed-keys/README.md b/src/managed-keys/README.md index dd99e584..88782177 100644 --- a/src/managed-keys/README.md +++ b/src/managed-keys/README.md @@ -1,3 +1,3 @@ # `vault_managed_keys` -Refer to the Terraform Registory for docs: [`vault_managed_keys`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/managed_keys). +Refer to the Terraform Registry for docs: [`vault_managed_keys`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/managed_keys). diff --git a/src/managed-keys/index.ts b/src/managed-keys/index.ts index b78e7275..05597e3a 100644 --- a/src/managed-keys/index.ts +++ b/src/managed-keys/index.ts @@ -147,6 +147,97 @@ export function managedKeysAwsToTerraform(struct?: ManagedKeysAws | cdktf.IResol } } + +export function managedKeysAwsToHclTerraform(struct?: ManagedKeysAws | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + access_key: { + value: cdktf.stringToHclTerraform(struct!.accessKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + allow_generate_key: { + value: cdktf.booleanToHclTerraform(struct!.allowGenerateKey), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + allow_replace_key: { + value: cdktf.booleanToHclTerraform(struct!.allowReplaceKey), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + allow_store_key: { + value: cdktf.booleanToHclTerraform(struct!.allowStoreKey), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + any_mount: { + value: cdktf.booleanToHclTerraform(struct!.anyMount), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + curve: { + value: cdktf.stringToHclTerraform(struct!.curve), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + endpoint: { + value: cdktf.stringToHclTerraform(struct!.endpoint), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key_bits: { + value: cdktf.stringToHclTerraform(struct!.keyBits), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key_type: { + value: cdktf.stringToHclTerraform(struct!.keyType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + kms_key: { + value: cdktf.stringToHclTerraform(struct!.kmsKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(struct!.name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + region: { + value: cdktf.stringToHclTerraform(struct!.region), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + secret_key: { + value: cdktf.stringToHclTerraform(struct!.secretKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class ManagedKeysAwsOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -588,6 +679,103 @@ export function managedKeysAzureToTerraform(struct?: ManagedKeysAzure | cdktf.IR } } + +export function managedKeysAzureToHclTerraform(struct?: ManagedKeysAzure | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + allow_generate_key: { + value: cdktf.booleanToHclTerraform(struct!.allowGenerateKey), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + allow_replace_key: { + value: cdktf.booleanToHclTerraform(struct!.allowReplaceKey), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + allow_store_key: { + value: cdktf.booleanToHclTerraform(struct!.allowStoreKey), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + any_mount: { + value: cdktf.booleanToHclTerraform(struct!.anyMount), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + client_id: { + value: cdktf.stringToHclTerraform(struct!.clientId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + client_secret: { + value: cdktf.stringToHclTerraform(struct!.clientSecret), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + environment: { + value: cdktf.stringToHclTerraform(struct!.environment), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key_bits: { + value: cdktf.stringToHclTerraform(struct!.keyBits), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key_name: { + value: cdktf.stringToHclTerraform(struct!.keyName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key_type: { + value: cdktf.stringToHclTerraform(struct!.keyType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(struct!.name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + resource: { + value: cdktf.stringToHclTerraform(struct!.resource), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + tenant_id: { + value: cdktf.stringToHclTerraform(struct!.tenantId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + vault_name: { + value: cdktf.stringToHclTerraform(struct!.vaultName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class ManagedKeysAzureOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -1055,6 +1243,109 @@ export function managedKeysPkcsToTerraform(struct?: ManagedKeysPkcs | cdktf.IRes } } + +export function managedKeysPkcsToHclTerraform(struct?: ManagedKeysPkcs | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + allow_generate_key: { + value: cdktf.booleanToHclTerraform(struct!.allowGenerateKey), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + allow_replace_key: { + value: cdktf.booleanToHclTerraform(struct!.allowReplaceKey), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + allow_store_key: { + value: cdktf.booleanToHclTerraform(struct!.allowStoreKey), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + any_mount: { + value: cdktf.booleanToHclTerraform(struct!.anyMount), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + curve: { + value: cdktf.stringToHclTerraform(struct!.curve), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + force_rw_session: { + value: cdktf.stringToHclTerraform(struct!.forceRwSession), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key_bits: { + value: cdktf.stringToHclTerraform(struct!.keyBits), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key_id: { + value: cdktf.stringToHclTerraform(struct!.keyId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key_label: { + value: cdktf.stringToHclTerraform(struct!.keyLabel), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + library: { + value: cdktf.stringToHclTerraform(struct!.library), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + mechanism: { + value: cdktf.stringToHclTerraform(struct!.mechanism), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(struct!.name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + pin: { + value: cdktf.stringToHclTerraform(struct!.pin), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + slot: { + value: cdktf.stringToHclTerraform(struct!.slot), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + token_label: { + value: cdktf.stringToHclTerraform(struct!.tokenLabel), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class ManagedKeysPkcsOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -1586,4 +1877,42 @@ export class ManagedKeys extends cdktf.TerraformResource { pkcs: cdktf.listMapper(managedKeysPkcsToTerraform, true)(this._pkcs.internalValue), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + aws: { + value: cdktf.listMapperHcl(managedKeysAwsToHclTerraform, true)(this._aws.internalValue), + isBlock: true, + type: "set", + storageClassType: "ManagedKeysAwsList", + }, + azure: { + value: cdktf.listMapperHcl(managedKeysAzureToHclTerraform, true)(this._azure.internalValue), + isBlock: true, + type: "set", + storageClassType: "ManagedKeysAzureList", + }, + pkcs: { + value: cdktf.listMapperHcl(managedKeysPkcsToHclTerraform, true)(this._pkcs.internalValue), + isBlock: true, + type: "set", + storageClassType: "ManagedKeysPkcsList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/mfa-duo/README.md b/src/mfa-duo/README.md index 057f6e63..015c00b7 100644 --- a/src/mfa-duo/README.md +++ b/src/mfa-duo/README.md @@ -1,3 +1,3 @@ # `vault_mfa_duo` -Refer to the Terraform Registory for docs: [`vault_mfa_duo`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/mfa_duo). +Refer to the Terraform Registry for docs: [`vault_mfa_duo`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/mfa_duo). diff --git a/src/mfa-duo/index.ts b/src/mfa-duo/index.ts index 3f2fe7b1..ef470f24 100644 --- a/src/mfa-duo/index.ts +++ b/src/mfa-duo/index.ts @@ -281,4 +281,66 @@ export class MfaDuo extends cdktf.TerraformResource { username_format: cdktf.stringToTerraform(this._usernameFormat), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + api_hostname: { + value: cdktf.stringToHclTerraform(this._apiHostname), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + integration_key: { + value: cdktf.stringToHclTerraform(this._integrationKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + mount_accessor: { + value: cdktf.stringToHclTerraform(this._mountAccessor), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + push_info: { + value: cdktf.stringToHclTerraform(this._pushInfo), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + secret_key: { + value: cdktf.stringToHclTerraform(this._secretKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_format: { + value: cdktf.stringToHclTerraform(this._usernameFormat), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/mfa-okta/README.md b/src/mfa-okta/README.md index 7b821cc9..43e9bf3f 100644 --- a/src/mfa-okta/README.md +++ b/src/mfa-okta/README.md @@ -1,3 +1,3 @@ # `vault_mfa_okta` -Refer to the Terraform Registory for docs: [`vault_mfa_okta`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/mfa_okta). +Refer to the Terraform Registry for docs: [`vault_mfa_okta`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/mfa_okta). diff --git a/src/mfa-okta/index.ts b/src/mfa-okta/index.ts index 88300d15..c8443cdf 100644 --- a/src/mfa-okta/index.ts +++ b/src/mfa-okta/index.ts @@ -286,4 +286,66 @@ export class MfaOkta extends cdktf.TerraformResource { username_format: cdktf.stringToTerraform(this._usernameFormat), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + api_token: { + value: cdktf.stringToHclTerraform(this._apiToken), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + base_url: { + value: cdktf.stringToHclTerraform(this._baseUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + mount_accessor: { + value: cdktf.stringToHclTerraform(this._mountAccessor), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + org_name: { + value: cdktf.stringToHclTerraform(this._orgName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + primary_email: { + value: cdktf.booleanToHclTerraform(this._primaryEmail), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + username_format: { + value: cdktf.stringToHclTerraform(this._usernameFormat), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/mfa-pingid/README.md b/src/mfa-pingid/README.md index e9d9be92..9a8b545a 100644 --- a/src/mfa-pingid/README.md +++ b/src/mfa-pingid/README.md @@ -1,3 +1,3 @@ # `vault_mfa_pingid` -Refer to the Terraform Registory for docs: [`vault_mfa_pingid`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/mfa_pingid). +Refer to the Terraform Registry for docs: [`vault_mfa_pingid`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/mfa_pingid). diff --git a/src/mfa-pingid/index.ts b/src/mfa-pingid/index.ts index 0da94b97..0a541948 100644 --- a/src/mfa-pingid/index.ts +++ b/src/mfa-pingid/index.ts @@ -252,4 +252,48 @@ export class MfaPingid extends cdktf.TerraformResource { username_format: cdktf.stringToTerraform(this._usernameFormat), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + mount_accessor: { + value: cdktf.stringToHclTerraform(this._mountAccessor), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + settings_file_base64: { + value: cdktf.stringToHclTerraform(this._settingsFileBase64), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_format: { + value: cdktf.stringToHclTerraform(this._usernameFormat), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/mfa-totp/README.md b/src/mfa-totp/README.md index 2c14a8dc..748b821d 100644 --- a/src/mfa-totp/README.md +++ b/src/mfa-totp/README.md @@ -1,3 +1,3 @@ # `vault_mfa_totp` -Refer to the Terraform Registory for docs: [`vault_mfa_totp`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/mfa_totp). +Refer to the Terraform Registry for docs: [`vault_mfa_totp`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/mfa_totp). diff --git a/src/mfa-totp/index.ts b/src/mfa-totp/index.ts index 727686e4..8758101d 100644 --- a/src/mfa-totp/index.ts +++ b/src/mfa-totp/index.ts @@ -316,4 +316,72 @@ export class MfaTotp extends cdktf.TerraformResource { skew: cdktf.numberToTerraform(this._skew), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + algorithm: { + value: cdktf.stringToHclTerraform(this._algorithm), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + digits: { + value: cdktf.numberToHclTerraform(this._digits), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + issuer: { + value: cdktf.stringToHclTerraform(this._issuer), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key_size: { + value: cdktf.numberToHclTerraform(this._keySize), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + period: { + value: cdktf.numberToHclTerraform(this._period), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + qr_size: { + value: cdktf.numberToHclTerraform(this._qrSize), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + skew: { + value: cdktf.numberToHclTerraform(this._skew), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/mongodbatlas-secret-backend/README.md b/src/mongodbatlas-secret-backend/README.md index 8579045c..2346d0e8 100644 --- a/src/mongodbatlas-secret-backend/README.md +++ b/src/mongodbatlas-secret-backend/README.md @@ -1,3 +1,3 @@ # `vault_mongodbatlas_secret_backend` -Refer to the Terraform Registory for docs: [`vault_mongodbatlas_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/mongodbatlas_secret_backend). +Refer to the Terraform Registry for docs: [`vault_mongodbatlas_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/mongodbatlas_secret_backend). diff --git a/src/mongodbatlas-secret-backend/index.ts b/src/mongodbatlas-secret-backend/index.ts index 3e18fe19..aa66815f 100644 --- a/src/mongodbatlas-secret-backend/index.ts +++ b/src/mongodbatlas-secret-backend/index.ts @@ -196,4 +196,42 @@ export class MongodbatlasSecretBackend extends cdktf.TerraformResource { public_key: cdktf.stringToTerraform(this._publicKey), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + mount: { + value: cdktf.stringToHclTerraform(this._mount), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + private_key: { + value: cdktf.stringToHclTerraform(this._privateKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + public_key: { + value: cdktf.stringToHclTerraform(this._publicKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/mongodbatlas-secret-role/README.md b/src/mongodbatlas-secret-role/README.md index fe0265d0..d45cf573 100644 --- a/src/mongodbatlas-secret-role/README.md +++ b/src/mongodbatlas-secret-role/README.md @@ -1,3 +1,3 @@ # `vault_mongodbatlas_secret_role` -Refer to the Terraform Registory for docs: [`vault_mongodbatlas_secret_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/mongodbatlas_secret_role). +Refer to the Terraform Registry for docs: [`vault_mongodbatlas_secret_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/mongodbatlas_secret_role). diff --git a/src/mongodbatlas-secret-role/index.ts b/src/mongodbatlas-secret-role/index.ts index 4ba6224b..3e9017ad 100644 --- a/src/mongodbatlas-secret-role/index.ts +++ b/src/mongodbatlas-secret-role/index.ts @@ -359,4 +359,84 @@ export class MongodbatlasSecretRole extends cdktf.TerraformResource { ttl: cdktf.stringToTerraform(this._ttl), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + cidr_blocks: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._cidrBlocks), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ip_addresses: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._ipAddresses), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + max_ttl: { + value: cdktf.stringToHclTerraform(this._maxTtl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + mount: { + value: cdktf.stringToHclTerraform(this._mount), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + organization_id: { + value: cdktf.stringToHclTerraform(this._organizationId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + project_id: { + value: cdktf.stringToHclTerraform(this._projectId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + project_roles: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._projectRoles), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + roles: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._roles), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + ttl: { + value: cdktf.stringToHclTerraform(this._ttl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/mount/README.md b/src/mount/README.md index 1d9db550..b96ebb51 100644 --- a/src/mount/README.md +++ b/src/mount/README.md @@ -1,3 +1,3 @@ # `vault_mount` -Refer to the Terraform Registory for docs: [`vault_mount`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/mount). +Refer to the Terraform Registry for docs: [`vault_mount`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/mount). diff --git a/src/mount/index.ts b/src/mount/index.ts index aa9fc7b8..3a312f25 100644 --- a/src/mount/index.ts +++ b/src/mount/index.ts @@ -415,4 +415,96 @@ export class Mount extends cdktf.TerraformResource { type: cdktf.stringToTerraform(this._type), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + allowed_managed_keys: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._allowedManagedKeys), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + audit_non_hmac_request_keys: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._auditNonHmacRequestKeys), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + audit_non_hmac_response_keys: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._auditNonHmacResponseKeys), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + default_lease_ttl_seconds: { + value: cdktf.numberToHclTerraform(this._defaultLeaseTtlSeconds), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + description: { + value: cdktf.stringToHclTerraform(this._description), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + external_entropy_access: { + value: cdktf.booleanToHclTerraform(this._externalEntropyAccess), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + local: { + value: cdktf.booleanToHclTerraform(this._local), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + max_lease_ttl_seconds: { + value: cdktf.numberToHclTerraform(this._maxLeaseTtlSeconds), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + options: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(this._options), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + seal_wrap: { + value: cdktf.booleanToHclTerraform(this._sealWrap), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + type: { + value: cdktf.stringToHclTerraform(this._type), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/namespace/README.md b/src/namespace/README.md index c31eca05..1a075c2b 100644 --- a/src/namespace/README.md +++ b/src/namespace/README.md @@ -1,3 +1,3 @@ # `vault_namespace` -Refer to the Terraform Registory for docs: [`vault_namespace`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/namespace). +Refer to the Terraform Registry for docs: [`vault_namespace`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/namespace). diff --git a/src/namespace/index.ts b/src/namespace/index.ts index b68c323d..8ce0bfbc 100644 --- a/src/namespace/index.ts +++ b/src/namespace/index.ts @@ -202,4 +202,42 @@ export class Namespace extends cdktf.TerraformResource { path_fq: cdktf.stringToTerraform(this._pathFq), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + custom_metadata: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(this._customMetadata), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path_fq: { + value: cdktf.stringToHclTerraform(this._pathFq), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/nomad-secret-backend/README.md b/src/nomad-secret-backend/README.md index ada44097..6334fd61 100644 --- a/src/nomad-secret-backend/README.md +++ b/src/nomad-secret-backend/README.md @@ -1,3 +1,3 @@ # `vault_nomad_secret_backend` -Refer to the Terraform Registory for docs: [`vault_nomad_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/nomad_secret_backend). +Refer to the Terraform Registry for docs: [`vault_nomad_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/nomad_secret_backend). diff --git a/src/nomad-secret-backend/index.ts b/src/nomad-secret-backend/index.ts index dabedf46..e930f292 100644 --- a/src/nomad-secret-backend/index.ts +++ b/src/nomad-secret-backend/index.ts @@ -464,4 +464,108 @@ export class NomadSecretBackend extends cdktf.TerraformResource { ttl: cdktf.numberToTerraform(this._ttl), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + address: { + value: cdktf.stringToHclTerraform(this._address), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ca_cert: { + value: cdktf.stringToHclTerraform(this._caCert), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + client_cert: { + value: cdktf.stringToHclTerraform(this._clientCert), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + client_key: { + value: cdktf.stringToHclTerraform(this._clientKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + default_lease_ttl_seconds: { + value: cdktf.numberToHclTerraform(this._defaultLeaseTtlSeconds), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + description: { + value: cdktf.stringToHclTerraform(this._description), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disable_remount: { + value: cdktf.booleanToHclTerraform(this._disableRemount), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + local: { + value: cdktf.booleanToHclTerraform(this._local), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + max_lease_ttl_seconds: { + value: cdktf.numberToHclTerraform(this._maxLeaseTtlSeconds), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_token_name_length: { + value: cdktf.numberToHclTerraform(this._maxTokenNameLength), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_ttl: { + value: cdktf.numberToHclTerraform(this._maxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + token: { + value: cdktf.stringToHclTerraform(this._token), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ttl: { + value: cdktf.numberToHclTerraform(this._ttl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/nomad-secret-role/README.md b/src/nomad-secret-role/README.md index 4ad8b773..463957fb 100644 --- a/src/nomad-secret-role/README.md +++ b/src/nomad-secret-role/README.md @@ -1,3 +1,3 @@ # `vault_nomad_secret_role` -Refer to the Terraform Registory for docs: [`vault_nomad_secret_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/nomad_secret_role). +Refer to the Terraform Registry for docs: [`vault_nomad_secret_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/nomad_secret_role). diff --git a/src/nomad-secret-role/index.ts b/src/nomad-secret-role/index.ts index b5a49c01..d25ca131 100644 --- a/src/nomad-secret-role/index.ts +++ b/src/nomad-secret-role/index.ts @@ -242,4 +242,54 @@ export class NomadSecretRole extends cdktf.TerraformResource { type: cdktf.stringToTerraform(this._type), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + global: { + value: cdktf.booleanToHclTerraform(this._global), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._policies), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + role: { + value: cdktf.stringToHclTerraform(this._role), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + type: { + value: cdktf.stringToHclTerraform(this._type), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/okta-auth-backend-group/README.md b/src/okta-auth-backend-group/README.md index 54a87cf2..07eade68 100644 --- a/src/okta-auth-backend-group/README.md +++ b/src/okta-auth-backend-group/README.md @@ -1,3 +1,3 @@ # `vault_okta_auth_backend_group` -Refer to the Terraform Registory for docs: [`vault_okta_auth_backend_group`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/okta_auth_backend_group). +Refer to the Terraform Registry for docs: [`vault_okta_auth_backend_group`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/okta_auth_backend_group). diff --git a/src/okta-auth-backend-group/index.ts b/src/okta-auth-backend-group/index.ts index cd44d138..a70d17dc 100644 --- a/src/okta-auth-backend-group/index.ts +++ b/src/okta-auth-backend-group/index.ts @@ -194,4 +194,42 @@ export class OktaAuthBackendGroupA extends cdktf.TerraformResource { policies: cdktf.listMapper(cdktf.stringToTerraform, false)(this._policies), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + group_name: { + value: cdktf.stringToHclTerraform(this._groupName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._policies), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/okta-auth-backend-user/README.md b/src/okta-auth-backend-user/README.md index 54d8d2ad..cf408214 100644 --- a/src/okta-auth-backend-user/README.md +++ b/src/okta-auth-backend-user/README.md @@ -1,3 +1,3 @@ # `vault_okta_auth_backend_user` -Refer to the Terraform Registory for docs: [`vault_okta_auth_backend_user`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/okta_auth_backend_user). +Refer to the Terraform Registry for docs: [`vault_okta_auth_backend_user`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/okta_auth_backend_user). diff --git a/src/okta-auth-backend-user/index.ts b/src/okta-auth-backend-user/index.ts index 436ee555..fc488241 100644 --- a/src/okta-auth-backend-user/index.ts +++ b/src/okta-auth-backend-user/index.ts @@ -218,4 +218,48 @@ export class OktaAuthBackendUserA extends cdktf.TerraformResource { username: cdktf.stringToTerraform(this._username), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + groups: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._groups), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._policies), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + username: { + value: cdktf.stringToHclTerraform(this._username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/okta-auth-backend/README.md b/src/okta-auth-backend/README.md index 5fda1464..da97e899 100644 --- a/src/okta-auth-backend/README.md +++ b/src/okta-auth-backend/README.md @@ -1,3 +1,3 @@ # `vault_okta_auth_backend` -Refer to the Terraform Registory for docs: [`vault_okta_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/okta_auth_backend). +Refer to the Terraform Registry for docs: [`vault_okta_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/okta_auth_backend). diff --git a/src/okta-auth-backend/index.ts b/src/okta-auth-backend/index.ts index 091c4140..9a349d2f 100644 --- a/src/okta-auth-backend/index.ts +++ b/src/okta-auth-backend/index.ts @@ -110,6 +110,31 @@ export function oktaAuthBackendGroupToTerraform(struct?: OktaAuthBackendGroup | } } + +export function oktaAuthBackendGroupToHclTerraform(struct?: OktaAuthBackendGroup | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + group_name: { + value: struct!.groupName === undefined ? null : cdktf.stringToHclTerraform(struct!.groupName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + policies: { + value: struct!.policies === undefined ? null : cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.policies), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class OktaAuthBackendGroupOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -239,6 +264,37 @@ export function oktaAuthBackendUserToTerraform(struct?: OktaAuthBackendUser | cd } } + +export function oktaAuthBackendUserToHclTerraform(struct?: OktaAuthBackendUser | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + groups: { + value: struct!.groups === undefined ? null : cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.groups), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + policies: { + value: struct!.policies === undefined ? null : cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(struct!.policies), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + username: { + value: struct!.username === undefined ? null : cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class OktaAuthBackendUserOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -665,4 +721,90 @@ export class OktaAuthBackend extends cdktf.TerraformResource { user: cdktf.listMapper(oktaAuthBackendUserToTerraform, false)(this._user.internalValue), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + base_url: { + value: cdktf.stringToHclTerraform(this._baseUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + bypass_okta_mfa: { + value: cdktf.booleanToHclTerraform(this._bypassOktaMfa), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + description: { + value: cdktf.stringToHclTerraform(this._description), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disable_remount: { + value: cdktf.booleanToHclTerraform(this._disableRemount), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + group: { + value: cdktf.listMapperHcl(oktaAuthBackendGroupToHclTerraform, false)(this._group.internalValue), + isBlock: true, + type: "set", + storageClassType: "OktaAuthBackendGroupList", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_ttl: { + value: cdktf.stringToHclTerraform(this._maxTtl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + organization: { + value: cdktf.stringToHclTerraform(this._organization), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + token: { + value: cdktf.stringToHclTerraform(this._token), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ttl: { + value: cdktf.stringToHclTerraform(this._ttl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + user: { + value: cdktf.listMapperHcl(oktaAuthBackendUserToHclTerraform, false)(this._user.internalValue), + isBlock: true, + type: "set", + storageClassType: "OktaAuthBackendUserList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/password-policy/README.md b/src/password-policy/README.md index d64be0cb..4a7e58a3 100644 --- a/src/password-policy/README.md +++ b/src/password-policy/README.md @@ -1,3 +1,3 @@ # `vault_password_policy` -Refer to the Terraform Registory for docs: [`vault_password_policy`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/password_policy). +Refer to the Terraform Registry for docs: [`vault_password_policy`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/password_policy). diff --git a/src/password-policy/index.ts b/src/password-policy/index.ts index b269aaa4..6b828320 100644 --- a/src/password-policy/index.ts +++ b/src/password-policy/index.ts @@ -170,4 +170,36 @@ export class PasswordPolicy extends cdktf.TerraformResource { policy: cdktf.stringToTerraform(this._policy), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + policy: { + value: cdktf.stringToHclTerraform(this._policy), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/pki-secret-backend-cert/README.md b/src/pki-secret-backend-cert/README.md index 5d635b8f..1607aa1c 100644 --- a/src/pki-secret-backend-cert/README.md +++ b/src/pki-secret-backend-cert/README.md @@ -1,3 +1,3 @@ # `vault_pki_secret_backend_cert` -Refer to the Terraform Registory for docs: [`vault_pki_secret_backend_cert`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/pki_secret_backend_cert). +Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_cert`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/pki_secret_backend_cert). diff --git a/src/pki-secret-backend-cert/index.ts b/src/pki-secret-backend-cert/index.ts index 4d0ac470..83ce6517 100644 --- a/src/pki-secret-backend-cert/index.ts +++ b/src/pki-secret-backend-cert/index.ts @@ -543,4 +543,120 @@ export class PkiSecretBackendCert extends cdktf.TerraformResource { user_ids: cdktf.listMapper(cdktf.stringToTerraform, false)(this._userIds), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + alt_names: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._altNames), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + auto_renew: { + value: cdktf.booleanToHclTerraform(this._autoRenew), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + common_name: { + value: cdktf.stringToHclTerraform(this._commonName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + exclude_cn_from_sans: { + value: cdktf.booleanToHclTerraform(this._excludeCnFromSans), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + format: { + value: cdktf.stringToHclTerraform(this._format), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ip_sans: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._ipSans), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + issuer_ref: { + value: cdktf.stringToHclTerraform(this._issuerRef), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + min_seconds_remaining: { + value: cdktf.numberToHclTerraform(this._minSecondsRemaining), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + other_sans: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._otherSans), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + private_key_format: { + value: cdktf.stringToHclTerraform(this._privateKeyFormat), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + revoke: { + value: cdktf.booleanToHclTerraform(this._revoke), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + ttl: { + value: cdktf.stringToHclTerraform(this._ttl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + uri_sans: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._uriSans), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + user_ids: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._userIds), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/pki-secret-backend-config-ca/README.md b/src/pki-secret-backend-config-ca/README.md index cddb3286..cdcf7b9e 100644 --- a/src/pki-secret-backend-config-ca/README.md +++ b/src/pki-secret-backend-config-ca/README.md @@ -1,3 +1,3 @@ # `vault_pki_secret_backend_config_ca` -Refer to the Terraform Registory for docs: [`vault_pki_secret_backend_config_ca`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/pki_secret_backend_config_ca). +Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_config_ca`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/pki_secret_backend_config_ca). diff --git a/src/pki-secret-backend-config-ca/index.ts b/src/pki-secret-backend-config-ca/index.ts index ca526be4..c05e586e 100644 --- a/src/pki-secret-backend-config-ca/index.ts +++ b/src/pki-secret-backend-config-ca/index.ts @@ -170,4 +170,36 @@ export class PkiSecretBackendConfigCa extends cdktf.TerraformResource { pem_bundle: cdktf.stringToTerraform(this._pemBundle), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + pem_bundle: { + value: cdktf.stringToHclTerraform(this._pemBundle), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/pki-secret-backend-config-issuers/README.md b/src/pki-secret-backend-config-issuers/README.md index 888a22b5..77602f4f 100644 --- a/src/pki-secret-backend-config-issuers/README.md +++ b/src/pki-secret-backend-config-issuers/README.md @@ -1,3 +1,3 @@ # `vault_pki_secret_backend_config_issuers` -Refer to the Terraform Registory for docs: [`vault_pki_secret_backend_config_issuers`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/pki_secret_backend_config_issuers). +Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_config_issuers`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/pki_secret_backend_config_issuers). diff --git a/src/pki-secret-backend-config-issuers/index.ts b/src/pki-secret-backend-config-issuers/index.ts index f12538d8..c63d26be 100644 --- a/src/pki-secret-backend-config-issuers/index.ts +++ b/src/pki-secret-backend-config-issuers/index.ts @@ -197,4 +197,42 @@ export class PkiSecretBackendConfigIssuers extends cdktf.TerraformResource { namespace: cdktf.stringToTerraform(this._namespace), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + default: { + value: cdktf.stringToHclTerraform(this._default), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + default_follows_latest_issuer: { + value: cdktf.booleanToHclTerraform(this._defaultFollowsLatestIssuer), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/pki-secret-backend-config-urls/README.md b/src/pki-secret-backend-config-urls/README.md index 47dbd686..641e9745 100644 --- a/src/pki-secret-backend-config-urls/README.md +++ b/src/pki-secret-backend-config-urls/README.md @@ -1,3 +1,3 @@ # `vault_pki_secret_backend_config_urls` -Refer to the Terraform Registory for docs: [`vault_pki_secret_backend_config_urls`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/pki_secret_backend_config_urls). +Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_config_urls`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/pki_secret_backend_config_urls). diff --git a/src/pki-secret-backend-config-urls/index.ts b/src/pki-secret-backend-config-urls/index.ts index 668c3e3e..aa65551d 100644 --- a/src/pki-secret-backend-config-urls/index.ts +++ b/src/pki-secret-backend-config-urls/index.ts @@ -221,4 +221,48 @@ export class PkiSecretBackendConfigUrls extends cdktf.TerraformResource { ocsp_servers: cdktf.listMapper(cdktf.stringToTerraform, false)(this._ocspServers), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + crl_distribution_points: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._crlDistributionPoints), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + issuing_certificates: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._issuingCertificates), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ocsp_servers: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._ocspServers), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/pki-secret-backend-crl-config/README.md b/src/pki-secret-backend-crl-config/README.md index a580fea4..dc6f15ca 100644 --- a/src/pki-secret-backend-crl-config/README.md +++ b/src/pki-secret-backend-crl-config/README.md @@ -1,3 +1,3 @@ # `vault_pki_secret_backend_crl_config` -Refer to the Terraform Registory for docs: [`vault_pki_secret_backend_crl_config`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/pki_secret_backend_crl_config). +Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_crl_config`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/pki_secret_backend_crl_config). diff --git a/src/pki-secret-backend-crl-config/index.ts b/src/pki-secret-backend-crl-config/index.ts index 752fd7cb..a7aef1d4 100644 --- a/src/pki-secret-backend-crl-config/index.ts +++ b/src/pki-secret-backend-crl-config/index.ts @@ -413,4 +413,96 @@ export class PkiSecretBackendCrlConfig extends cdktf.TerraformResource { unified_crl_on_existing_paths: cdktf.booleanToTerraform(this._unifiedCrlOnExistingPaths), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + auto_rebuild: { + value: cdktf.booleanToHclTerraform(this._autoRebuild), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + auto_rebuild_grace_period: { + value: cdktf.stringToHclTerraform(this._autoRebuildGracePeriod), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + cross_cluster_revocation: { + value: cdktf.booleanToHclTerraform(this._crossClusterRevocation), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + delta_rebuild_interval: { + value: cdktf.stringToHclTerraform(this._deltaRebuildInterval), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disable: { + value: cdktf.booleanToHclTerraform(this._disable), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + enable_delta: { + value: cdktf.booleanToHclTerraform(this._enableDelta), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + expiry: { + value: cdktf.stringToHclTerraform(this._expiry), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ocsp_disable: { + value: cdktf.booleanToHclTerraform(this._ocspDisable), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + ocsp_expiry: { + value: cdktf.stringToHclTerraform(this._ocspExpiry), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + unified_crl: { + value: cdktf.booleanToHclTerraform(this._unifiedCrl), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + unified_crl_on_existing_paths: { + value: cdktf.booleanToHclTerraform(this._unifiedCrlOnExistingPaths), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/pki-secret-backend-intermediate-cert-request/README.md b/src/pki-secret-backend-intermediate-cert-request/README.md index 313cc665..212eec56 100644 --- a/src/pki-secret-backend-intermediate-cert-request/README.md +++ b/src/pki-secret-backend-intermediate-cert-request/README.md @@ -1,3 +1,3 @@ # `vault_pki_secret_backend_intermediate_cert_request` -Refer to the Terraform Registory for docs: [`vault_pki_secret_backend_intermediate_cert_request`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/pki_secret_backend_intermediate_cert_request). +Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_intermediate_cert_request`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/pki_secret_backend_intermediate_cert_request). diff --git a/src/pki-secret-backend-intermediate-cert-request/index.ts b/src/pki-secret-backend-intermediate-cert-request/index.ts index e7618c6d..72401056 100644 --- a/src/pki-secret-backend-intermediate-cert-request/index.ts +++ b/src/pki-secret-backend-intermediate-cert-request/index.ts @@ -716,4 +716,168 @@ export class PkiSecretBackendIntermediateCertRequest extends cdktf.TerraformReso uri_sans: cdktf.listMapper(cdktf.stringToTerraform, false)(this._uriSans), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + add_basic_constraints: { + value: cdktf.booleanToHclTerraform(this._addBasicConstraints), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + alt_names: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._altNames), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + common_name: { + value: cdktf.stringToHclTerraform(this._commonName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + country: { + value: cdktf.stringToHclTerraform(this._country), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + exclude_cn_from_sans: { + value: cdktf.booleanToHclTerraform(this._excludeCnFromSans), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + format: { + value: cdktf.stringToHclTerraform(this._format), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ip_sans: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._ipSans), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + key_bits: { + value: cdktf.numberToHclTerraform(this._keyBits), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + key_name: { + value: cdktf.stringToHclTerraform(this._keyName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key_ref: { + value: cdktf.stringToHclTerraform(this._keyRef), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key_type: { + value: cdktf.stringToHclTerraform(this._keyType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + locality: { + value: cdktf.stringToHclTerraform(this._locality), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + managed_key_id: { + value: cdktf.stringToHclTerraform(this._managedKeyId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + managed_key_name: { + value: cdktf.stringToHclTerraform(this._managedKeyName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + organization: { + value: cdktf.stringToHclTerraform(this._organization), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + other_sans: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._otherSans), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + ou: { + value: cdktf.stringToHclTerraform(this._ou), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + postal_code: { + value: cdktf.stringToHclTerraform(this._postalCode), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + private_key_format: { + value: cdktf.stringToHclTerraform(this._privateKeyFormat), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + province: { + value: cdktf.stringToHclTerraform(this._province), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + street_address: { + value: cdktf.stringToHclTerraform(this._streetAddress), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + type: { + value: cdktf.stringToHclTerraform(this._type), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + uri_sans: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._uriSans), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/pki-secret-backend-intermediate-set-signed/README.md b/src/pki-secret-backend-intermediate-set-signed/README.md index 3a374fb7..51b10b2a 100644 --- a/src/pki-secret-backend-intermediate-set-signed/README.md +++ b/src/pki-secret-backend-intermediate-set-signed/README.md @@ -1,3 +1,3 @@ # `vault_pki_secret_backend_intermediate_set_signed` -Refer to the Terraform Registory for docs: [`vault_pki_secret_backend_intermediate_set_signed`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/pki_secret_backend_intermediate_set_signed). +Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_intermediate_set_signed`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/pki_secret_backend_intermediate_set_signed). diff --git a/src/pki-secret-backend-intermediate-set-signed/index.ts b/src/pki-secret-backend-intermediate-set-signed/index.ts index 0f2d6daa..723e8e31 100644 --- a/src/pki-secret-backend-intermediate-set-signed/index.ts +++ b/src/pki-secret-backend-intermediate-set-signed/index.ts @@ -180,4 +180,36 @@ export class PkiSecretBackendIntermediateSetSigned extends cdktf.TerraformResour namespace: cdktf.stringToTerraform(this._namespace), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + certificate: { + value: cdktf.stringToHclTerraform(this._certificate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/pki-secret-backend-issuer/README.md b/src/pki-secret-backend-issuer/README.md index ad7997ac..77dae1d0 100644 --- a/src/pki-secret-backend-issuer/README.md +++ b/src/pki-secret-backend-issuer/README.md @@ -1,3 +1,3 @@ # `vault_pki_secret_backend_issuer` -Refer to the Terraform Registory for docs: [`vault_pki_secret_backend_issuer`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/pki_secret_backend_issuer). +Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_issuer`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/pki_secret_backend_issuer). diff --git a/src/pki-secret-backend-issuer/index.ts b/src/pki-secret-backend-issuer/index.ts index 6614b81a..77692f6b 100644 --- a/src/pki-secret-backend-issuer/index.ts +++ b/src/pki-secret-backend-issuer/index.ts @@ -391,4 +391,90 @@ export class PkiSecretBackendIssuer extends cdktf.TerraformResource { usage: cdktf.stringToTerraform(this._usage), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + crl_distribution_points: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._crlDistributionPoints), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + enable_aia_url_templating: { + value: cdktf.booleanToHclTerraform(this._enableAiaUrlTemplating), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + issuer_name: { + value: cdktf.stringToHclTerraform(this._issuerName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + issuer_ref: { + value: cdktf.stringToHclTerraform(this._issuerRef), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + issuing_certificates: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._issuingCertificates), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + leaf_not_after_behavior: { + value: cdktf.stringToHclTerraform(this._leafNotAfterBehavior), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + manual_chain: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._manualChain), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ocsp_servers: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._ocspServers), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + revocation_signature_algorithm: { + value: cdktf.stringToHclTerraform(this._revocationSignatureAlgorithm), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + usage: { + value: cdktf.stringToHclTerraform(this._usage), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/pki-secret-backend-key/README.md b/src/pki-secret-backend-key/README.md index 351c42c7..6aac657b 100644 --- a/src/pki-secret-backend-key/README.md +++ b/src/pki-secret-backend-key/README.md @@ -1,3 +1,3 @@ # `vault_pki_secret_backend_key` -Refer to the Terraform Registory for docs: [`vault_pki_secret_backend_key`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/pki_secret_backend_key). +Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_key`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/pki_secret_backend_key). diff --git a/src/pki-secret-backend-key/index.ts b/src/pki-secret-backend-key/index.ts index 6437ce33..ba8be614 100644 --- a/src/pki-secret-backend-key/index.ts +++ b/src/pki-secret-backend-key/index.ts @@ -295,4 +295,66 @@ export class PkiSecretBackendKey extends cdktf.TerraformResource { type: cdktf.stringToTerraform(this._type), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key_bits: { + value: cdktf.numberToHclTerraform(this._keyBits), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + key_name: { + value: cdktf.stringToHclTerraform(this._keyName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key_type: { + value: cdktf.stringToHclTerraform(this._keyType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + managed_key_id: { + value: cdktf.stringToHclTerraform(this._managedKeyId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + managed_key_name: { + value: cdktf.stringToHclTerraform(this._managedKeyName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + type: { + value: cdktf.stringToHclTerraform(this._type), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/pki-secret-backend-role/README.md b/src/pki-secret-backend-role/README.md index b5329d60..dd823681 100644 --- a/src/pki-secret-backend-role/README.md +++ b/src/pki-secret-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_pki_secret_backend_role` -Refer to the Terraform Registory for docs: [`vault_pki_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/pki_secret_backend_role). +Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/pki_secret_backend_role). diff --git a/src/pki-secret-backend-role/index.ts b/src/pki-secret-backend-role/index.ts index c138fba1..a5d8ec01 100644 --- a/src/pki-secret-backend-role/index.ts +++ b/src/pki-secret-backend-role/index.ts @@ -323,6 +323,37 @@ export function pkiSecretBackendRolePolicyIdentifierToTerraform(struct?: PkiSecr } } + +export function pkiSecretBackendRolePolicyIdentifierToHclTerraform(struct?: PkiSecretBackendRolePolicyIdentifier | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + cps: { + value: cdktf.stringToHclTerraform(struct!.cps), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + notice: { + value: cdktf.stringToHclTerraform(struct!.notice), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + oid: { + value: cdktf.stringToHclTerraform(struct!.oid), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class PkiSecretBackendRolePolicyIdentifierOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -1332,4 +1363,288 @@ export class PkiSecretBackendRole extends cdktf.TerraformResource { policy_identifier: cdktf.listMapper(pkiSecretBackendRolePolicyIdentifierToTerraform, true)(this._policyIdentifier.internalValue), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + allow_any_name: { + value: cdktf.booleanToHclTerraform(this._allowAnyName), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + allow_bare_domains: { + value: cdktf.booleanToHclTerraform(this._allowBareDomains), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + allow_glob_domains: { + value: cdktf.booleanToHclTerraform(this._allowGlobDomains), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + allow_ip_sans: { + value: cdktf.booleanToHclTerraform(this._allowIpSans), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + allow_localhost: { + value: cdktf.booleanToHclTerraform(this._allowLocalhost), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + allow_subdomains: { + value: cdktf.booleanToHclTerraform(this._allowSubdomains), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + allow_wildcard_certificates: { + value: cdktf.booleanToHclTerraform(this._allowWildcardCertificates), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + allowed_domains: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._allowedDomains), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + allowed_domains_template: { + value: cdktf.booleanToHclTerraform(this._allowedDomainsTemplate), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + allowed_other_sans: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._allowedOtherSans), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + allowed_serial_numbers: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._allowedSerialNumbers), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + allowed_uri_sans: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._allowedUriSans), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + allowed_uri_sans_template: { + value: cdktf.booleanToHclTerraform(this._allowedUriSansTemplate), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + allowed_user_ids: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._allowedUserIds), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + basic_constraints_valid_for_non_ca: { + value: cdktf.booleanToHclTerraform(this._basicConstraintsValidForNonCa), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + client_flag: { + value: cdktf.booleanToHclTerraform(this._clientFlag), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + code_signing_flag: { + value: cdktf.booleanToHclTerraform(this._codeSigningFlag), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + country: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._country), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + email_protection_flag: { + value: cdktf.booleanToHclTerraform(this._emailProtectionFlag), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + enforce_hostnames: { + value: cdktf.booleanToHclTerraform(this._enforceHostnames), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + ext_key_usage: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._extKeyUsage), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + generate_lease: { + value: cdktf.booleanToHclTerraform(this._generateLease), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + issuer_ref: { + value: cdktf.stringToHclTerraform(this._issuerRef), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key_bits: { + value: cdktf.numberToHclTerraform(this._keyBits), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + key_type: { + value: cdktf.stringToHclTerraform(this._keyType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key_usage: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._keyUsage), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + locality: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._locality), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + max_ttl: { + value: cdktf.stringToHclTerraform(this._maxTtl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + no_store: { + value: cdktf.booleanToHclTerraform(this._noStore), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + not_before_duration: { + value: cdktf.stringToHclTerraform(this._notBeforeDuration), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + organization: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._organization), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + ou: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._ou), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + policy_identifiers: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._policyIdentifiers), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + postal_code: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._postalCode), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + province: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._province), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + require_cn: { + value: cdktf.booleanToHclTerraform(this._requireCn), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + server_flag: { + value: cdktf.booleanToHclTerraform(this._serverFlag), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + street_address: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._streetAddress), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + ttl: { + value: cdktf.stringToHclTerraform(this._ttl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + use_csr_common_name: { + value: cdktf.booleanToHclTerraform(this._useCsrCommonName), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + use_csr_sans: { + value: cdktf.booleanToHclTerraform(this._useCsrSans), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + policy_identifier: { + value: cdktf.listMapperHcl(pkiSecretBackendRolePolicyIdentifierToHclTerraform, true)(this._policyIdentifier.internalValue), + isBlock: true, + type: "set", + storageClassType: "PkiSecretBackendRolePolicyIdentifierList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/pki-secret-backend-root-cert/README.md b/src/pki-secret-backend-root-cert/README.md index 1b0b5df1..65c8ad66 100644 --- a/src/pki-secret-backend-root-cert/README.md +++ b/src/pki-secret-backend-root-cert/README.md @@ -1,3 +1,3 @@ # `vault_pki_secret_backend_root_cert` -Refer to the Terraform Registory for docs: [`vault_pki_secret_backend_root_cert`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/pki_secret_backend_root_cert). +Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_root_cert`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/pki_secret_backend_root_cert). diff --git a/src/pki-secret-backend-root-cert/index.ts b/src/pki-secret-backend-root-cert/index.ts index 59bf27dc..1e8435c7 100644 --- a/src/pki-secret-backend-root-cert/index.ts +++ b/src/pki-secret-backend-root-cert/index.ts @@ -797,4 +797,186 @@ export class PkiSecretBackendRootCert extends cdktf.TerraformResource { uri_sans: cdktf.listMapper(cdktf.stringToTerraform, false)(this._uriSans), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + alt_names: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._altNames), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + common_name: { + value: cdktf.stringToHclTerraform(this._commonName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + country: { + value: cdktf.stringToHclTerraform(this._country), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + exclude_cn_from_sans: { + value: cdktf.booleanToHclTerraform(this._excludeCnFromSans), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + format: { + value: cdktf.stringToHclTerraform(this._format), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ip_sans: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._ipSans), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + issuer_name: { + value: cdktf.stringToHclTerraform(this._issuerName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key_bits: { + value: cdktf.numberToHclTerraform(this._keyBits), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + key_name: { + value: cdktf.stringToHclTerraform(this._keyName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key_ref: { + value: cdktf.stringToHclTerraform(this._keyRef), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key_type: { + value: cdktf.stringToHclTerraform(this._keyType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + locality: { + value: cdktf.stringToHclTerraform(this._locality), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + managed_key_id: { + value: cdktf.stringToHclTerraform(this._managedKeyId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + managed_key_name: { + value: cdktf.stringToHclTerraform(this._managedKeyName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_path_length: { + value: cdktf.numberToHclTerraform(this._maxPathLength), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + organization: { + value: cdktf.stringToHclTerraform(this._organization), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + other_sans: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._otherSans), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + ou: { + value: cdktf.stringToHclTerraform(this._ou), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + permitted_dns_domains: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._permittedDnsDomains), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + postal_code: { + value: cdktf.stringToHclTerraform(this._postalCode), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + private_key_format: { + value: cdktf.stringToHclTerraform(this._privateKeyFormat), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + province: { + value: cdktf.stringToHclTerraform(this._province), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + street_address: { + value: cdktf.stringToHclTerraform(this._streetAddress), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ttl: { + value: cdktf.stringToHclTerraform(this._ttl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + type: { + value: cdktf.stringToHclTerraform(this._type), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + uri_sans: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._uriSans), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/pki-secret-backend-root-sign-intermediate/README.md b/src/pki-secret-backend-root-sign-intermediate/README.md index 9950ce6d..0c62c550 100644 --- a/src/pki-secret-backend-root-sign-intermediate/README.md +++ b/src/pki-secret-backend-root-sign-intermediate/README.md @@ -1,3 +1,3 @@ # `vault_pki_secret_backend_root_sign_intermediate` -Refer to the Terraform Registory for docs: [`vault_pki_secret_backend_root_sign_intermediate`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/pki_secret_backend_root_sign_intermediate). +Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_root_sign_intermediate`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/pki_secret_backend_root_sign_intermediate). diff --git a/src/pki-secret-backend-root-sign-intermediate/index.ts b/src/pki-secret-backend-root-sign-intermediate/index.ts index 3f3ef3a5..fa7f653d 100644 --- a/src/pki-secret-backend-root-sign-intermediate/index.ts +++ b/src/pki-secret-backend-root-sign-intermediate/index.ts @@ -677,4 +677,156 @@ export class PkiSecretBackendRootSignIntermediate extends cdktf.TerraformResourc use_csr_values: cdktf.booleanToTerraform(this._useCsrValues), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + alt_names: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._altNames), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + common_name: { + value: cdktf.stringToHclTerraform(this._commonName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + country: { + value: cdktf.stringToHclTerraform(this._country), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + csr: { + value: cdktf.stringToHclTerraform(this._csr), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + exclude_cn_from_sans: { + value: cdktf.booleanToHclTerraform(this._excludeCnFromSans), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + format: { + value: cdktf.stringToHclTerraform(this._format), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ip_sans: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._ipSans), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + issuer_ref: { + value: cdktf.stringToHclTerraform(this._issuerRef), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + locality: { + value: cdktf.stringToHclTerraform(this._locality), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_path_length: { + value: cdktf.numberToHclTerraform(this._maxPathLength), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + organization: { + value: cdktf.stringToHclTerraform(this._organization), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + other_sans: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._otherSans), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + ou: { + value: cdktf.stringToHclTerraform(this._ou), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + permitted_dns_domains: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._permittedDnsDomains), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + postal_code: { + value: cdktf.stringToHclTerraform(this._postalCode), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + province: { + value: cdktf.stringToHclTerraform(this._province), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + revoke: { + value: cdktf.booleanToHclTerraform(this._revoke), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + street_address: { + value: cdktf.stringToHclTerraform(this._streetAddress), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ttl: { + value: cdktf.stringToHclTerraform(this._ttl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + uri_sans: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._uriSans), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + use_csr_values: { + value: cdktf.booleanToHclTerraform(this._useCsrValues), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/pki-secret-backend-sign/README.md b/src/pki-secret-backend-sign/README.md index 99353687..8012ac88 100644 --- a/src/pki-secret-backend-sign/README.md +++ b/src/pki-secret-backend-sign/README.md @@ -1,3 +1,3 @@ # `vault_pki_secret_backend_sign` -Refer to the Terraform Registory for docs: [`vault_pki_secret_backend_sign`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/pki_secret_backend_sign). +Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_sign`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/pki_secret_backend_sign). diff --git a/src/pki-secret-backend-sign/index.ts b/src/pki-secret-backend-sign/index.ts index 370f5526..70e55b97 100644 --- a/src/pki-secret-backend-sign/index.ts +++ b/src/pki-secret-backend-sign/index.ts @@ -487,4 +487,108 @@ export class PkiSecretBackendSign extends cdktf.TerraformResource { uri_sans: cdktf.listMapper(cdktf.stringToTerraform, false)(this._uriSans), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + alt_names: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._altNames), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + auto_renew: { + value: cdktf.booleanToHclTerraform(this._autoRenew), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + common_name: { + value: cdktf.stringToHclTerraform(this._commonName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + csr: { + value: cdktf.stringToHclTerraform(this._csr), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + exclude_cn_from_sans: { + value: cdktf.booleanToHclTerraform(this._excludeCnFromSans), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + format: { + value: cdktf.stringToHclTerraform(this._format), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ip_sans: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._ipSans), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + issuer_ref: { + value: cdktf.stringToHclTerraform(this._issuerRef), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + min_seconds_remaining: { + value: cdktf.numberToHclTerraform(this._minSecondsRemaining), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + other_sans: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._otherSans), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + ttl: { + value: cdktf.stringToHclTerraform(this._ttl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + uri_sans: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._uriSans), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/policy/README.md b/src/policy/README.md index c495651c..87f9f185 100644 --- a/src/policy/README.md +++ b/src/policy/README.md @@ -1,3 +1,3 @@ # `vault_policy` -Refer to the Terraform Registory for docs: [`vault_policy`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/policy). +Refer to the Terraform Registry for docs: [`vault_policy`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/policy). diff --git a/src/policy/index.ts b/src/policy/index.ts index dc36def5..c5137370 100644 --- a/src/policy/index.ts +++ b/src/policy/index.ts @@ -170,4 +170,36 @@ export class Policy extends cdktf.TerraformResource { policy: cdktf.stringToTerraform(this._policy), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + policy: { + value: cdktf.stringToHclTerraform(this._policy), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/provider/README.md b/src/provider/README.md index 5cbf5c6a..09a1d2b8 100644 --- a/src/provider/README.md +++ b/src/provider/README.md @@ -1,3 +1,3 @@ # `provider` -Refer to the Terraform Registory for docs: [`vault`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs). +Refer to the Terraform Registry for docs: [`vault`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs). diff --git a/src/provider/index.ts b/src/provider/index.ts index 0d81d061..39d8f640 100644 --- a/src/provider/index.ts +++ b/src/provider/index.ts @@ -240,6 +240,49 @@ export function vaultProviderAuthLoginToTerraform(struct?: VaultProviderAuthLogi } } + +export function vaultProviderAuthLoginToHclTerraform(struct?: VaultProviderAuthLogin): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + method: { + value: cdktf.stringToHclTerraform(struct!.method), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(struct!.namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + parameters: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(struct!.parameters), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + path: { + value: cdktf.stringToHclTerraform(struct!.path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + use_root_namespace: { + value: cdktf.booleanToHclTerraform(struct!.useRootNamespace), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export interface VaultProviderAuthLoginAws { /** * The AWS access key ID. @@ -364,6 +407,115 @@ export function vaultProviderAuthLoginAwsToTerraform(struct?: VaultProviderAuthL } } + +export function vaultProviderAuthLoginAwsToHclTerraform(struct?: VaultProviderAuthLoginAws): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + aws_access_key_id: { + value: cdktf.stringToHclTerraform(struct!.awsAccessKeyId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + aws_iam_endpoint: { + value: cdktf.stringToHclTerraform(struct!.awsIamEndpoint), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + aws_profile: { + value: cdktf.stringToHclTerraform(struct!.awsProfile), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + aws_region: { + value: cdktf.stringToHclTerraform(struct!.awsRegion), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + aws_role_arn: { + value: cdktf.stringToHclTerraform(struct!.awsRoleArn), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + aws_role_session_name: { + value: cdktf.stringToHclTerraform(struct!.awsRoleSessionName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + aws_secret_access_key: { + value: cdktf.stringToHclTerraform(struct!.awsSecretAccessKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + aws_session_token: { + value: cdktf.stringToHclTerraform(struct!.awsSessionToken), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + aws_shared_credentials_file: { + value: cdktf.stringToHclTerraform(struct!.awsSharedCredentialsFile), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + aws_sts_endpoint: { + value: cdktf.stringToHclTerraform(struct!.awsStsEndpoint), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + aws_web_identity_token_file: { + value: cdktf.stringToHclTerraform(struct!.awsWebIdentityTokenFile), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + header_value: { + value: cdktf.stringToHclTerraform(struct!.headerValue), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + mount: { + value: cdktf.stringToHclTerraform(struct!.mount), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(struct!.namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role: { + value: cdktf.stringToHclTerraform(struct!.role), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + use_root_namespace: { + value: cdktf.booleanToHclTerraform(struct!.useRootNamespace), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export interface VaultProviderAuthLoginAzure { /** * The identity's client ID. @@ -460,6 +612,91 @@ export function vaultProviderAuthLoginAzureToTerraform(struct?: VaultProviderAut } } + +export function vaultProviderAuthLoginAzureToHclTerraform(struct?: VaultProviderAuthLoginAzure): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + client_id: { + value: cdktf.stringToHclTerraform(struct!.clientId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + jwt: { + value: cdktf.stringToHclTerraform(struct!.jwt), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + mount: { + value: cdktf.stringToHclTerraform(struct!.mount), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(struct!.namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + resource_group_name: { + value: cdktf.stringToHclTerraform(struct!.resourceGroupName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role: { + value: cdktf.stringToHclTerraform(struct!.role), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + scope: { + value: cdktf.stringToHclTerraform(struct!.scope), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + subscription_id: { + value: cdktf.stringToHclTerraform(struct!.subscriptionId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + tenant_id: { + value: cdktf.stringToHclTerraform(struct!.tenantId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + use_root_namespace: { + value: cdktf.booleanToHclTerraform(struct!.useRootNamespace), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + vm_name: { + value: cdktf.stringToHclTerraform(struct!.vmName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + vmss_name: { + value: cdktf.stringToHclTerraform(struct!.vmssName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export interface VaultProviderAuthLoginCert { /** * Path to a file containing the client certificate. @@ -514,6 +751,55 @@ export function vaultProviderAuthLoginCertToTerraform(struct?: VaultProviderAuth } } + +export function vaultProviderAuthLoginCertToHclTerraform(struct?: VaultProviderAuthLoginCert): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + cert_file: { + value: cdktf.stringToHclTerraform(struct!.certFile), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key_file: { + value: cdktf.stringToHclTerraform(struct!.keyFile), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + mount: { + value: cdktf.stringToHclTerraform(struct!.mount), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(struct!.name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(struct!.namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + use_root_namespace: { + value: cdktf.booleanToHclTerraform(struct!.useRootNamespace), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export interface VaultProviderAuthLoginGcp { /** * Path to the Google Cloud credentials file. @@ -575,6 +861,61 @@ export function vaultProviderAuthLoginGcpToTerraform(struct?: VaultProviderAuthL } } + +export function vaultProviderAuthLoginGcpToHclTerraform(struct?: VaultProviderAuthLoginGcp): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + credentials: { + value: cdktf.stringToHclTerraform(struct!.credentials), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + jwt: { + value: cdktf.stringToHclTerraform(struct!.jwt), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + mount: { + value: cdktf.stringToHclTerraform(struct!.mount), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(struct!.namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role: { + value: cdktf.stringToHclTerraform(struct!.role), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + service_account: { + value: cdktf.stringToHclTerraform(struct!.serviceAccount), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + use_root_namespace: { + value: cdktf.booleanToHclTerraform(struct!.useRootNamespace), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export interface VaultProviderAuthLoginJwt { /** * A signed JSON Web Token. @@ -622,6 +963,49 @@ export function vaultProviderAuthLoginJwtToTerraform(struct?: VaultProviderAuthL } } + +export function vaultProviderAuthLoginJwtToHclTerraform(struct?: VaultProviderAuthLoginJwt): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + jwt: { + value: cdktf.stringToHclTerraform(struct!.jwt), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + mount: { + value: cdktf.stringToHclTerraform(struct!.mount), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(struct!.namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role: { + value: cdktf.stringToHclTerraform(struct!.role), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + use_root_namespace: { + value: cdktf.booleanToHclTerraform(struct!.useRootNamespace), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export interface VaultProviderAuthLoginKerberos { /** * Disable the Kerberos FAST negotiation. @@ -711,6 +1095,85 @@ export function vaultProviderAuthLoginKerberosToTerraform(struct?: VaultProvider } } + +export function vaultProviderAuthLoginKerberosToHclTerraform(struct?: VaultProviderAuthLoginKerberos): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + disable_fast_negotiation: { + value: cdktf.booleanToHclTerraform(struct!.disableFastNegotiation), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + keytab_path: { + value: cdktf.stringToHclTerraform(struct!.keytabPath), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + krb5conf_path: { + value: cdktf.stringToHclTerraform(struct!.krb5ConfPath), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + mount: { + value: cdktf.stringToHclTerraform(struct!.mount), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(struct!.namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + realm: { + value: cdktf.stringToHclTerraform(struct!.realm), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + remove_instance_name: { + value: cdktf.booleanToHclTerraform(struct!.removeInstanceName), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + service: { + value: cdktf.stringToHclTerraform(struct!.service), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + token: { + value: cdktf.stringToHclTerraform(struct!.token), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + use_root_namespace: { + value: cdktf.booleanToHclTerraform(struct!.useRootNamespace), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export interface VaultProviderAuthLoginOci { /** * Authentication type to use when getting OCI credentials. @@ -758,6 +1221,49 @@ export function vaultProviderAuthLoginOciToTerraform(struct?: VaultProviderAuthL } } + +export function vaultProviderAuthLoginOciToHclTerraform(struct?: VaultProviderAuthLoginOci): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + auth_type: { + value: cdktf.stringToHclTerraform(struct!.authType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + mount: { + value: cdktf.stringToHclTerraform(struct!.mount), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(struct!.namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role: { + value: cdktf.stringToHclTerraform(struct!.role), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + use_root_namespace: { + value: cdktf.booleanToHclTerraform(struct!.useRootNamespace), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export interface VaultProviderAuthLoginOidc { /** * The callback address. Must be a valid URI without the path. @@ -812,6 +1318,55 @@ export function vaultProviderAuthLoginOidcToTerraform(struct?: VaultProviderAuth } } + +export function vaultProviderAuthLoginOidcToHclTerraform(struct?: VaultProviderAuthLoginOidc): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + callback_address: { + value: cdktf.stringToHclTerraform(struct!.callbackAddress), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + callback_listener_address: { + value: cdktf.stringToHclTerraform(struct!.callbackListenerAddress), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + mount: { + value: cdktf.stringToHclTerraform(struct!.mount), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(struct!.namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role: { + value: cdktf.stringToHclTerraform(struct!.role), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + use_root_namespace: { + value: cdktf.booleanToHclTerraform(struct!.useRootNamespace), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export interface VaultProviderAuthLoginRadius { /** * The path where the authentication engine is mounted. @@ -859,6 +1414,49 @@ export function vaultProviderAuthLoginRadiusToTerraform(struct?: VaultProviderAu } } + +export function vaultProviderAuthLoginRadiusToHclTerraform(struct?: VaultProviderAuthLoginRadius): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + mount: { + value: cdktf.stringToHclTerraform(struct!.mount), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(struct!.namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + use_root_namespace: { + value: cdktf.booleanToHclTerraform(struct!.useRootNamespace), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export interface VaultProviderAuthLoginTokenFile { /** * The name of a file containing a single line that is a valid Vault token @@ -892,6 +1490,37 @@ export function vaultProviderAuthLoginTokenFileToTerraform(struct?: VaultProvide } } + +export function vaultProviderAuthLoginTokenFileToHclTerraform(struct?: VaultProviderAuthLoginTokenFile): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + filename: { + value: cdktf.stringToHclTerraform(struct!.filename), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(struct!.namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + use_root_namespace: { + value: cdktf.booleanToHclTerraform(struct!.useRootNamespace), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export interface VaultProviderAuthLoginUserpass { /** * The path where the authentication engine is mounted. @@ -946,6 +1575,55 @@ export function vaultProviderAuthLoginUserpassToTerraform(struct?: VaultProvider } } + +export function vaultProviderAuthLoginUserpassToHclTerraform(struct?: VaultProviderAuthLoginUserpass): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + mount: { + value: cdktf.stringToHclTerraform(struct!.mount), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(struct!.namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + password: { + value: cdktf.stringToHclTerraform(struct!.password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + password_file: { + value: cdktf.stringToHclTerraform(struct!.passwordFile), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + use_root_namespace: { + value: cdktf.booleanToHclTerraform(struct!.useRootNamespace), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + username: { + value: cdktf.stringToHclTerraform(struct!.username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export interface VaultProviderClientAuth { /** * Path to a file containing the client certificate. @@ -972,6 +1650,31 @@ export function vaultProviderClientAuthToTerraform(struct?: VaultProviderClientA } } + +export function vaultProviderClientAuthToHclTerraform(struct?: VaultProviderClientAuth): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + cert_file: { + value: cdktf.stringToHclTerraform(struct!.certFile), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key_file: { + value: cdktf.stringToHclTerraform(struct!.keyFile), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export interface VaultProviderHeaders { /** * The header name @@ -999,6 +1702,31 @@ export function vaultProviderHeadersToTerraform(struct?: VaultProviderHeaders | } +export function vaultProviderHeadersToHclTerraform(struct?: VaultProviderHeaders | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + name: { + value: cdktf.stringToHclTerraform(struct!.name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + value: { + value: cdktf.stringToHclTerraform(struct!.value), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + + /** * Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs vault} */ @@ -1613,4 +2341,198 @@ export class VaultProvider extends cdktf.TerraformProvider { headers: cdktf.listMapper(vaultProviderHeadersToTerraform, true)(this._headers), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + add_address_to_env: { + value: cdktf.stringToHclTerraform(this._addAddressToEnv), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + address: { + value: cdktf.stringToHclTerraform(this._address), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ca_cert_dir: { + value: cdktf.stringToHclTerraform(this._caCertDir), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ca_cert_file: { + value: cdktf.stringToHclTerraform(this._caCertFile), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_lease_ttl_seconds: { + value: cdktf.numberToHclTerraform(this._maxLeaseTtlSeconds), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_retries: { + value: cdktf.numberToHclTerraform(this._maxRetries), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + max_retries_ccc: { + value: cdktf.numberToHclTerraform(this._maxRetriesCcc), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + set_namespace_from_token: { + value: cdktf.booleanToHclTerraform(this._setNamespaceFromToken), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + skip_child_token: { + value: cdktf.booleanToHclTerraform(this._skipChildToken), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + skip_get_vault_version: { + value: cdktf.booleanToHclTerraform(this._skipGetVaultVersion), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + skip_tls_verify: { + value: cdktf.booleanToHclTerraform(this._skipTlsVerify), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + tls_server_name: { + value: cdktf.stringToHclTerraform(this._tlsServerName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + token: { + value: cdktf.stringToHclTerraform(this._token), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + token_name: { + value: cdktf.stringToHclTerraform(this._tokenName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + vault_version_override: { + value: cdktf.stringToHclTerraform(this._vaultVersionOverride), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + alias: { + value: cdktf.stringToHclTerraform(this._alias), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + auth_login: { + value: vaultProviderAuthLoginToHclTerraform(this._authLogin), + isBlock: true, + type: "list", + storageClassType: "VaultProviderAuthLoginList", + }, + auth_login_aws: { + value: vaultProviderAuthLoginAwsToHclTerraform(this._authLoginAws), + isBlock: true, + type: "list", + storageClassType: "VaultProviderAuthLoginAwsList", + }, + auth_login_azure: { + value: vaultProviderAuthLoginAzureToHclTerraform(this._authLoginAzure), + isBlock: true, + type: "list", + storageClassType: "VaultProviderAuthLoginAzureList", + }, + auth_login_cert: { + value: vaultProviderAuthLoginCertToHclTerraform(this._authLoginCert), + isBlock: true, + type: "list", + storageClassType: "VaultProviderAuthLoginCertList", + }, + auth_login_gcp: { + value: vaultProviderAuthLoginGcpToHclTerraform(this._authLoginGcp), + isBlock: true, + type: "list", + storageClassType: "VaultProviderAuthLoginGcpList", + }, + auth_login_jwt: { + value: vaultProviderAuthLoginJwtToHclTerraform(this._authLoginJwt), + isBlock: true, + type: "list", + storageClassType: "VaultProviderAuthLoginJwtList", + }, + auth_login_kerberos: { + value: vaultProviderAuthLoginKerberosToHclTerraform(this._authLoginKerberos), + isBlock: true, + type: "list", + storageClassType: "VaultProviderAuthLoginKerberosList", + }, + auth_login_oci: { + value: vaultProviderAuthLoginOciToHclTerraform(this._authLoginOci), + isBlock: true, + type: "list", + storageClassType: "VaultProviderAuthLoginOciList", + }, + auth_login_oidc: { + value: vaultProviderAuthLoginOidcToHclTerraform(this._authLoginOidc), + isBlock: true, + type: "list", + storageClassType: "VaultProviderAuthLoginOidcList", + }, + auth_login_radius: { + value: vaultProviderAuthLoginRadiusToHclTerraform(this._authLoginRadius), + isBlock: true, + type: "list", + storageClassType: "VaultProviderAuthLoginRadiusList", + }, + auth_login_token_file: { + value: vaultProviderAuthLoginTokenFileToHclTerraform(this._authLoginTokenFile), + isBlock: true, + type: "list", + storageClassType: "VaultProviderAuthLoginTokenFileList", + }, + auth_login_userpass: { + value: vaultProviderAuthLoginUserpassToHclTerraform(this._authLoginUserpass), + isBlock: true, + type: "list", + storageClassType: "VaultProviderAuthLoginUserpassList", + }, + client_auth: { + value: vaultProviderClientAuthToHclTerraform(this._clientAuth), + isBlock: true, + type: "list", + storageClassType: "VaultProviderClientAuthList", + }, + headers: { + value: cdktf.listMapperHcl(vaultProviderHeadersToHclTerraform, true)(this._headers), + isBlock: true, + type: "list", + storageClassType: "VaultProviderHeadersList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/quota-lease-count/README.md b/src/quota-lease-count/README.md index efb1fdd3..4ffc45a2 100644 --- a/src/quota-lease-count/README.md +++ b/src/quota-lease-count/README.md @@ -1,3 +1,3 @@ # `vault_quota_lease_count` -Refer to the Terraform Registory for docs: [`vault_quota_lease_count`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/quota_lease_count). +Refer to the Terraform Registry for docs: [`vault_quota_lease_count`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/quota_lease_count). diff --git a/src/quota-lease-count/index.ts b/src/quota-lease-count/index.ts index 5eb3c326..53f5375b 100644 --- a/src/quota-lease-count/index.ts +++ b/src/quota-lease-count/index.ts @@ -218,4 +218,48 @@ export class QuotaLeaseCount extends cdktf.TerraformResource { role: cdktf.stringToTerraform(this._role), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_leases: { + value: cdktf.numberToHclTerraform(this._maxLeases), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role: { + value: cdktf.stringToHclTerraform(this._role), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/quota-rate-limit/README.md b/src/quota-rate-limit/README.md index 8fcd0f8f..2f635441 100644 --- a/src/quota-rate-limit/README.md +++ b/src/quota-rate-limit/README.md @@ -1,3 +1,3 @@ # `vault_quota_rate_limit` -Refer to the Terraform Registory for docs: [`vault_quota_rate_limit`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/quota_rate_limit). +Refer to the Terraform Registry for docs: [`vault_quota_rate_limit`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/quota_rate_limit). diff --git a/src/quota-rate-limit/index.ts b/src/quota-rate-limit/index.ts index 971f2c34..90bda9d1 100644 --- a/src/quota-rate-limit/index.ts +++ b/src/quota-rate-limit/index.ts @@ -266,4 +266,60 @@ export class QuotaRateLimit extends cdktf.TerraformResource { role: cdktf.stringToTerraform(this._role), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + block_interval: { + value: cdktf.numberToHclTerraform(this._blockInterval), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + interval: { + value: cdktf.numberToHclTerraform(this._interval), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + rate: { + value: cdktf.numberToHclTerraform(this._rate), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + role: { + value: cdktf.stringToHclTerraform(this._role), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/rabbitmq-secret-backend-role/README.md b/src/rabbitmq-secret-backend-role/README.md index 22d4b2b8..7230eb7f 100644 --- a/src/rabbitmq-secret-backend-role/README.md +++ b/src/rabbitmq-secret-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_rabbitmq_secret_backend_role` -Refer to the Terraform Registory for docs: [`vault_rabbitmq_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/rabbitmq_secret_backend_role). +Refer to the Terraform Registry for docs: [`vault_rabbitmq_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/rabbitmq_secret_backend_role). diff --git a/src/rabbitmq-secret-backend-role/index.ts b/src/rabbitmq-secret-backend-role/index.ts index 8093993f..7f8c3a4a 100644 --- a/src/rabbitmq-secret-backend-role/index.ts +++ b/src/rabbitmq-secret-backend-role/index.ts @@ -96,6 +96,43 @@ export function rabbitmqSecretBackendRoleVhostToTerraform(struct?: RabbitmqSecre } } + +export function rabbitmqSecretBackendRoleVhostToHclTerraform(struct?: RabbitmqSecretBackendRoleVhost | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + configure: { + value: cdktf.stringToHclTerraform(struct!.configure), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + host: { + value: cdktf.stringToHclTerraform(struct!.host), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + read: { + value: cdktf.stringToHclTerraform(struct!.read), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + write: { + value: cdktf.stringToHclTerraform(struct!.write), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class RabbitmqSecretBackendRoleVhostOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -263,6 +300,37 @@ export function rabbitmqSecretBackendRoleVhostTopicVhostToTerraform(struct?: Rab } } + +export function rabbitmqSecretBackendRoleVhostTopicVhostToHclTerraform(struct?: RabbitmqSecretBackendRoleVhostTopicVhost | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + read: { + value: cdktf.stringToHclTerraform(struct!.read), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + topic: { + value: cdktf.stringToHclTerraform(struct!.topic), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + write: { + value: cdktf.stringToHclTerraform(struct!.write), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class RabbitmqSecretBackendRoleVhostTopicVhostOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -404,6 +472,31 @@ export function rabbitmqSecretBackendRoleVhostTopicToTerraform(struct?: Rabbitmq } } + +export function rabbitmqSecretBackendRoleVhostTopicToHclTerraform(struct?: RabbitmqSecretBackendRoleVhostTopic | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + host: { + value: cdktf.stringToHclTerraform(struct!.host), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + vhost: { + value: cdktf.listMapperHcl(rabbitmqSecretBackendRoleVhostTopicVhostToHclTerraform, true)(struct!.vhost), + isBlock: true, + type: "list", + storageClassType: "RabbitmqSecretBackendRoleVhostTopicVhostList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class RabbitmqSecretBackendRoleVhostTopicOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -689,4 +782,54 @@ export class RabbitmqSecretBackendRole extends cdktf.TerraformResource { vhost_topic: cdktf.listMapper(rabbitmqSecretBackendRoleVhostTopicToTerraform, true)(this._vhostTopic.internalValue), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + tags: { + value: cdktf.stringToHclTerraform(this._tags), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + vhost: { + value: cdktf.listMapperHcl(rabbitmqSecretBackendRoleVhostToHclTerraform, true)(this._vhost.internalValue), + isBlock: true, + type: "list", + storageClassType: "RabbitmqSecretBackendRoleVhostList", + }, + vhost_topic: { + value: cdktf.listMapperHcl(rabbitmqSecretBackendRoleVhostTopicToHclTerraform, true)(this._vhostTopic.internalValue), + isBlock: true, + type: "list", + storageClassType: "RabbitmqSecretBackendRoleVhostTopicList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/rabbitmq-secret-backend/README.md b/src/rabbitmq-secret-backend/README.md index 419b2ab1..0f68d3f8 100644 --- a/src/rabbitmq-secret-backend/README.md +++ b/src/rabbitmq-secret-backend/README.md @@ -1,3 +1,3 @@ # `vault_rabbitmq_secret_backend` -Refer to the Terraform Registory for docs: [`vault_rabbitmq_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/rabbitmq_secret_backend). +Refer to the Terraform Registry for docs: [`vault_rabbitmq_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/rabbitmq_secret_backend). diff --git a/src/rabbitmq-secret-backend/index.ts b/src/rabbitmq-secret-backend/index.ts index d084d35d..3ce4815c 100644 --- a/src/rabbitmq-secret-backend/index.ts +++ b/src/rabbitmq-secret-backend/index.ts @@ -383,4 +383,90 @@ export class RabbitmqSecretBackend extends cdktf.TerraformResource { verify_connection: cdktf.booleanToTerraform(this._verifyConnection), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + connection_uri: { + value: cdktf.stringToHclTerraform(this._connectionUri), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + default_lease_ttl_seconds: { + value: cdktf.numberToHclTerraform(this._defaultLeaseTtlSeconds), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + description: { + value: cdktf.stringToHclTerraform(this._description), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disable_remount: { + value: cdktf.booleanToHclTerraform(this._disableRemount), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_lease_ttl_seconds: { + value: cdktf.numberToHclTerraform(this._maxLeaseTtlSeconds), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + password: { + value: cdktf.stringToHclTerraform(this._password), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + password_policy: { + value: cdktf.stringToHclTerraform(this._passwordPolicy), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username: { + value: cdktf.stringToHclTerraform(this._username), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + username_template: { + value: cdktf.stringToHclTerraform(this._usernameTemplate), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + verify_connection: { + value: cdktf.booleanToHclTerraform(this._verifyConnection), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/raft-autopilot/README.md b/src/raft-autopilot/README.md index d14c001d..dc093d8c 100644 --- a/src/raft-autopilot/README.md +++ b/src/raft-autopilot/README.md @@ -1,3 +1,3 @@ # `vault_raft_autopilot` -Refer to the Terraform Registory for docs: [`vault_raft_autopilot`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/raft_autopilot). +Refer to the Terraform Registry for docs: [`vault_raft_autopilot`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/raft_autopilot). diff --git a/src/raft-autopilot/index.ts b/src/raft-autopilot/index.ts index 2176ef8e..708c7be4 100644 --- a/src/raft-autopilot/index.ts +++ b/src/raft-autopilot/index.ts @@ -296,4 +296,66 @@ export class RaftAutopilot extends cdktf.TerraformResource { server_stabilization_time: cdktf.stringToTerraform(this._serverStabilizationTime), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + cleanup_dead_servers: { + value: cdktf.booleanToHclTerraform(this._cleanupDeadServers), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + dead_server_last_contact_threshold: { + value: cdktf.stringToHclTerraform(this._deadServerLastContactThreshold), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disable_upgrade_migration: { + value: cdktf.booleanToHclTerraform(this._disableUpgradeMigration), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + last_contact_threshold: { + value: cdktf.stringToHclTerraform(this._lastContactThreshold), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_trailing_logs: { + value: cdktf.numberToHclTerraform(this._maxTrailingLogs), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + min_quorum: { + value: cdktf.numberToHclTerraform(this._minQuorum), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + server_stabilization_time: { + value: cdktf.stringToHclTerraform(this._serverStabilizationTime), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/raft-snapshot-agent-config/README.md b/src/raft-snapshot-agent-config/README.md index 11fbb39a..e6023729 100644 --- a/src/raft-snapshot-agent-config/README.md +++ b/src/raft-snapshot-agent-config/README.md @@ -1,3 +1,3 @@ # `vault_raft_snapshot_agent_config` -Refer to the Terraform Registory for docs: [`vault_raft_snapshot_agent_config`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/raft_snapshot_agent_config). +Refer to the Terraform Registry for docs: [`vault_raft_snapshot_agent_config`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/raft_snapshot_agent_config). diff --git a/src/raft-snapshot-agent-config/index.ts b/src/raft-snapshot-agent-config/index.ts index 3c4160b9..9d3d6173 100644 --- a/src/raft-snapshot-agent-config/index.ts +++ b/src/raft-snapshot-agent-config/index.ts @@ -764,4 +764,186 @@ export class RaftSnapshotAgentConfig extends cdktf.TerraformResource { storage_type: cdktf.stringToTerraform(this._storageType), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + aws_access_key_id: { + value: cdktf.stringToHclTerraform(this._awsAccessKeyId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + aws_s3_bucket: { + value: cdktf.stringToHclTerraform(this._awsS3Bucket), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + aws_s3_disable_tls: { + value: cdktf.booleanToHclTerraform(this._awsS3DisableTls), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + aws_s3_enable_kms: { + value: cdktf.booleanToHclTerraform(this._awsS3EnableKms), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + aws_s3_endpoint: { + value: cdktf.stringToHclTerraform(this._awsS3Endpoint), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + aws_s3_force_path_style: { + value: cdktf.booleanToHclTerraform(this._awsS3ForcePathStyle), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + aws_s3_kms_key: { + value: cdktf.stringToHclTerraform(this._awsS3KmsKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + aws_s3_region: { + value: cdktf.stringToHclTerraform(this._awsS3Region), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + aws_s3_server_side_encryption: { + value: cdktf.booleanToHclTerraform(this._awsS3ServerSideEncryption), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + aws_secret_access_key: { + value: cdktf.stringToHclTerraform(this._awsSecretAccessKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + aws_session_token: { + value: cdktf.stringToHclTerraform(this._awsSessionToken), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + azure_account_key: { + value: cdktf.stringToHclTerraform(this._azureAccountKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + azure_account_name: { + value: cdktf.stringToHclTerraform(this._azureAccountName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + azure_blob_environment: { + value: cdktf.stringToHclTerraform(this._azureBlobEnvironment), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + azure_container_name: { + value: cdktf.stringToHclTerraform(this._azureContainerName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + azure_endpoint: { + value: cdktf.stringToHclTerraform(this._azureEndpoint), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + file_prefix: { + value: cdktf.stringToHclTerraform(this._filePrefix), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + google_disable_tls: { + value: cdktf.booleanToHclTerraform(this._googleDisableTls), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + google_endpoint: { + value: cdktf.stringToHclTerraform(this._googleEndpoint), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + google_gcs_bucket: { + value: cdktf.stringToHclTerraform(this._googleGcsBucket), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + google_service_account_key: { + value: cdktf.stringToHclTerraform(this._googleServiceAccountKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + interval_seconds: { + value: cdktf.numberToHclTerraform(this._intervalSeconds), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + local_max_space: { + value: cdktf.numberToHclTerraform(this._localMaxSpace), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path_prefix: { + value: cdktf.stringToHclTerraform(this._pathPrefix), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + retain: { + value: cdktf.numberToHclTerraform(this._retain), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + storage_type: { + value: cdktf.stringToHclTerraform(this._storageType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/rgp-policy/README.md b/src/rgp-policy/README.md index a503ce81..eb7e2e79 100644 --- a/src/rgp-policy/README.md +++ b/src/rgp-policy/README.md @@ -1,3 +1,3 @@ # `vault_rgp_policy` -Refer to the Terraform Registory for docs: [`vault_rgp_policy`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/rgp_policy). +Refer to the Terraform Registry for docs: [`vault_rgp_policy`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/rgp_policy). diff --git a/src/rgp-policy/index.ts b/src/rgp-policy/index.ts index d8426045..f0917483 100644 --- a/src/rgp-policy/index.ts +++ b/src/rgp-policy/index.ts @@ -191,4 +191,42 @@ export class RgpPolicy extends cdktf.TerraformResource { policy: cdktf.stringToTerraform(this._policy), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + enforcement_level: { + value: cdktf.stringToHclTerraform(this._enforcementLevel), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + policy: { + value: cdktf.stringToHclTerraform(this._policy), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/saml-auth-backend-role/README.md b/src/saml-auth-backend-role/README.md index d965ae38..81a23a17 100644 --- a/src/saml-auth-backend-role/README.md +++ b/src/saml-auth-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_saml_auth_backend_role` -Refer to the Terraform Registory for docs: [`vault_saml_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/saml_auth_backend_role). +Refer to the Terraform Registry for docs: [`vault_saml_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/saml_auth_backend_role). diff --git a/src/saml-auth-backend-role/index.ts b/src/saml-auth-backend-role/index.ts index 7e57dee1..a6ba28ef 100644 --- a/src/saml-auth-backend-role/index.ts +++ b/src/saml-auth-backend-role/index.ts @@ -506,4 +506,120 @@ export class SamlAuthBackendRole extends cdktf.TerraformResource { token_type: cdktf.stringToTerraform(this._tokenType), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + bound_attributes: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(this._boundAttributes), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + bound_attributes_type: { + value: cdktf.stringToHclTerraform(this._boundAttributesType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + bound_subjects: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._boundSubjects), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + bound_subjects_type: { + value: cdktf.stringToHclTerraform(this._boundSubjectsType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + groups_attribute: { + value: cdktf.stringToHclTerraform(this._groupsAttribute), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + token_bound_cidrs: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenBoundCidrs), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_explicit_max_ttl: { + value: cdktf.numberToHclTerraform(this._tokenExplicitMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_max_ttl: { + value: cdktf.numberToHclTerraform(this._tokenMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_no_default_policy: { + value: cdktf.booleanToHclTerraform(this._tokenNoDefaultPolicy), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + token_num_uses: { + value: cdktf.numberToHclTerraform(this._tokenNumUses), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_period: { + value: cdktf.numberToHclTerraform(this._tokenPeriod), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenPolicies), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_ttl: { + value: cdktf.numberToHclTerraform(this._tokenTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_type: { + value: cdktf.stringToHclTerraform(this._tokenType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/saml-auth-backend/README.md b/src/saml-auth-backend/README.md index eeb45d5a..3b35b984 100644 --- a/src/saml-auth-backend/README.md +++ b/src/saml-auth-backend/README.md @@ -1,3 +1,3 @@ # `vault_saml_auth_backend` -Refer to the Terraform Registory for docs: [`vault_saml_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/saml_auth_backend). +Refer to the Terraform Registry for docs: [`vault_saml_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/saml_auth_backend). diff --git a/src/saml-auth-backend/index.ts b/src/saml-auth-backend/index.ts index 7c9b1fe2..f813fe67 100644 --- a/src/saml-auth-backend/index.ts +++ b/src/saml-auth-backend/index.ts @@ -362,4 +362,84 @@ export class SamlAuthBackend extends cdktf.TerraformResource { verbose_logging: cdktf.booleanToTerraform(this._verboseLogging), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + acs_urls: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._acsUrls), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + default_role: { + value: cdktf.stringToHclTerraform(this._defaultRole), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disable_remount: { + value: cdktf.booleanToHclTerraform(this._disableRemount), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + entity_id: { + value: cdktf.stringToHclTerraform(this._entityId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + idp_cert: { + value: cdktf.stringToHclTerraform(this._idpCert), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + idp_entity_id: { + value: cdktf.stringToHclTerraform(this._idpEntityId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + idp_metadata_url: { + value: cdktf.stringToHclTerraform(this._idpMetadataUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + idp_sso_url: { + value: cdktf.stringToHclTerraform(this._idpSsoUrl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + verbose_logging: { + value: cdktf.booleanToHclTerraform(this._verboseLogging), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/ssh-secret-backend-ca/README.md b/src/ssh-secret-backend-ca/README.md index c5a16a8e..41ad8937 100644 --- a/src/ssh-secret-backend-ca/README.md +++ b/src/ssh-secret-backend-ca/README.md @@ -1,3 +1,3 @@ # `vault_ssh_secret_backend_ca` -Refer to the Terraform Registory for docs: [`vault_ssh_secret_backend_ca`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/ssh_secret_backend_ca). +Refer to the Terraform Registry for docs: [`vault_ssh_secret_backend_ca`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/ssh_secret_backend_ca). diff --git a/src/ssh-secret-backend-ca/index.ts b/src/ssh-secret-backend-ca/index.ts index a6940963..e8ecc411 100644 --- a/src/ssh-secret-backend-ca/index.ts +++ b/src/ssh-secret-backend-ca/index.ts @@ -224,4 +224,48 @@ export class SshSecretBackendCa extends cdktf.TerraformResource { public_key: cdktf.stringToTerraform(this._publicKey), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + generate_signing_key: { + value: cdktf.booleanToHclTerraform(this._generateSigningKey), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + private_key: { + value: cdktf.stringToHclTerraform(this._privateKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + public_key: { + value: cdktf.stringToHclTerraform(this._publicKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/ssh-secret-backend-role/README.md b/src/ssh-secret-backend-role/README.md index 24027736..be76b4c1 100644 --- a/src/ssh-secret-backend-role/README.md +++ b/src/ssh-secret-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_ssh_secret_backend_role` -Refer to the Terraform Registory for docs: [`vault_ssh_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/ssh_secret_backend_role). +Refer to the Terraform Registry for docs: [`vault_ssh_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/ssh_secret_backend_role). diff --git a/src/ssh-secret-backend-role/index.ts b/src/ssh-secret-backend-role/index.ts index 99184946..47dd122c 100644 --- a/src/ssh-secret-backend-role/index.ts +++ b/src/ssh-secret-backend-role/index.ts @@ -163,6 +163,31 @@ export function sshSecretBackendRoleAllowedUserKeyConfigToTerraform(struct?: Ssh } } + +export function sshSecretBackendRoleAllowedUserKeyConfigToHclTerraform(struct?: SshSecretBackendRoleAllowedUserKeyConfig | cdktf.IResolvable): any { + if (!cdktf.canInspect(struct) || cdktf.Tokenization.isResolvable(struct)) { return struct; } + if (cdktf.isComplexElement(struct)) { + throw new Error("A complex element was used as configuration, this is not supported: https://cdk.tf/complex-object-as-configuration"); + } + const attrs = { + lengths: { + value: cdktf.listMapperHcl(cdktf.numberToHclTerraform, false)(struct!.lengths), + isBlock: false, + type: "list", + storageClassType: "numberList", + }, + type: { + value: cdktf.stringToHclTerraform(struct!.type), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined)); +} + export class SshSecretBackendRoleAllowedUserKeyConfigOutputReference extends cdktf.ComplexObject { private isEmptyObject = false; private resolvableValue?: cdktf.IResolvable; @@ -820,4 +845,180 @@ export class SshSecretBackendRole extends cdktf.TerraformResource { allowed_user_key_config: cdktf.listMapper(sshSecretBackendRoleAllowedUserKeyConfigToTerraform, true)(this._allowedUserKeyConfig.internalValue), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + algorithm_signer: { + value: cdktf.stringToHclTerraform(this._algorithmSigner), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + allow_bare_domains: { + value: cdktf.booleanToHclTerraform(this._allowBareDomains), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + allow_host_certificates: { + value: cdktf.booleanToHclTerraform(this._allowHostCertificates), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + allow_subdomains: { + value: cdktf.booleanToHclTerraform(this._allowSubdomains), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + allow_user_certificates: { + value: cdktf.booleanToHclTerraform(this._allowUserCertificates), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + allow_user_key_ids: { + value: cdktf.booleanToHclTerraform(this._allowUserKeyIds), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + allowed_critical_options: { + value: cdktf.stringToHclTerraform(this._allowedCriticalOptions), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + allowed_domains: { + value: cdktf.stringToHclTerraform(this._allowedDomains), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + allowed_domains_template: { + value: cdktf.booleanToHclTerraform(this._allowedDomainsTemplate), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + allowed_extensions: { + value: cdktf.stringToHclTerraform(this._allowedExtensions), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + allowed_user_key_lengths: { + value: cdktf.hashMapperHcl(cdktf.numberToHclTerraform)(this._allowedUserKeyLengths), + isBlock: false, + type: "map", + storageClassType: "numberMap", + }, + allowed_users: { + value: cdktf.stringToHclTerraform(this._allowedUsers), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + allowed_users_template: { + value: cdktf.booleanToHclTerraform(this._allowedUsersTemplate), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + cidr_list: { + value: cdktf.stringToHclTerraform(this._cidrList), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + default_critical_options: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(this._defaultCriticalOptions), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + default_extensions: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(this._defaultExtensions), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + default_user: { + value: cdktf.stringToHclTerraform(this._defaultUser), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + default_user_template: { + value: cdktf.booleanToHclTerraform(this._defaultUserTemplate), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key_id_format: { + value: cdktf.stringToHclTerraform(this._keyIdFormat), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key_type: { + value: cdktf.stringToHclTerraform(this._keyType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_ttl: { + value: cdktf.stringToHclTerraform(this._maxTtl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + not_before_duration: { + value: cdktf.stringToHclTerraform(this._notBeforeDuration), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ttl: { + value: cdktf.stringToHclTerraform(this._ttl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + allowed_user_key_config: { + value: cdktf.listMapperHcl(sshSecretBackendRoleAllowedUserKeyConfigToHclTerraform, true)(this._allowedUserKeyConfig.internalValue), + isBlock: true, + type: "set", + storageClassType: "SshSecretBackendRoleAllowedUserKeyConfigList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/terraform-cloud-secret-backend/README.md b/src/terraform-cloud-secret-backend/README.md index 4a9e80ac..8ca0024b 100644 --- a/src/terraform-cloud-secret-backend/README.md +++ b/src/terraform-cloud-secret-backend/README.md @@ -1,3 +1,3 @@ # `vault_terraform_cloud_secret_backend` -Refer to the Terraform Registory for docs: [`vault_terraform_cloud_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/terraform_cloud_secret_backend). +Refer to the Terraform Registry for docs: [`vault_terraform_cloud_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/terraform_cloud_secret_backend). diff --git a/src/terraform-cloud-secret-backend/index.ts b/src/terraform-cloud-secret-backend/index.ts index 64d38f15..83a13637 100644 --- a/src/terraform-cloud-secret-backend/index.ts +++ b/src/terraform-cloud-secret-backend/index.ts @@ -320,4 +320,72 @@ export class TerraformCloudSecretBackend extends cdktf.TerraformResource { token: cdktf.stringToTerraform(this._token), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + address: { + value: cdktf.stringToHclTerraform(this._address), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + base_path: { + value: cdktf.stringToHclTerraform(this._basePath), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + default_lease_ttl_seconds: { + value: cdktf.numberToHclTerraform(this._defaultLeaseTtlSeconds), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + description: { + value: cdktf.stringToHclTerraform(this._description), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + disable_remount: { + value: cdktf.booleanToHclTerraform(this._disableRemount), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_lease_ttl_seconds: { + value: cdktf.numberToHclTerraform(this._maxLeaseTtlSeconds), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + token: { + value: cdktf.stringToHclTerraform(this._token), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/terraform-cloud-secret-creds/README.md b/src/terraform-cloud-secret-creds/README.md index 34e503d8..d65dcac4 100644 --- a/src/terraform-cloud-secret-creds/README.md +++ b/src/terraform-cloud-secret-creds/README.md @@ -1,3 +1,3 @@ # `vault_terraform_cloud_secret_creds` -Refer to the Terraform Registory for docs: [`vault_terraform_cloud_secret_creds`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/terraform_cloud_secret_creds). +Refer to the Terraform Registry for docs: [`vault_terraform_cloud_secret_creds`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/terraform_cloud_secret_creds). diff --git a/src/terraform-cloud-secret-creds/index.ts b/src/terraform-cloud-secret-creds/index.ts index 22367c2c..79b85537 100644 --- a/src/terraform-cloud-secret-creds/index.ts +++ b/src/terraform-cloud-secret-creds/index.ts @@ -195,4 +195,36 @@ export class TerraformCloudSecretCreds extends cdktf.TerraformResource { role: cdktf.stringToTerraform(this._role), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + role: { + value: cdktf.stringToHclTerraform(this._role), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/terraform-cloud-secret-role/README.md b/src/terraform-cloud-secret-role/README.md index 03e640d4..f4f1ced9 100644 --- a/src/terraform-cloud-secret-role/README.md +++ b/src/terraform-cloud-secret-role/README.md @@ -1,3 +1,3 @@ # `vault_terraform_cloud_secret_role` -Refer to the Terraform Registory for docs: [`vault_terraform_cloud_secret_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/terraform_cloud_secret_role). +Refer to the Terraform Registry for docs: [`vault_terraform_cloud_secret_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/terraform_cloud_secret_role). diff --git a/src/terraform-cloud-secret-role/index.ts b/src/terraform-cloud-secret-role/index.ts index 28c940d1..b5e33483 100644 --- a/src/terraform-cloud-secret-role/index.ts +++ b/src/terraform-cloud-secret-role/index.ts @@ -293,4 +293,66 @@ export class TerraformCloudSecretRole extends cdktf.TerraformResource { user_id: cdktf.stringToTerraform(this._userId), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + max_ttl: { + value: cdktf.numberToHclTerraform(this._maxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + organization: { + value: cdktf.stringToHclTerraform(this._organization), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + team_id: { + value: cdktf.stringToHclTerraform(this._teamId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ttl: { + value: cdktf.numberToHclTerraform(this._ttl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + user_id: { + value: cdktf.stringToHclTerraform(this._userId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/token-auth-backend-role/README.md b/src/token-auth-backend-role/README.md index 183cffbd..9dd0fc23 100644 --- a/src/token-auth-backend-role/README.md +++ b/src/token-auth-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_token_auth_backend_role` -Refer to the Terraform Registory for docs: [`vault_token_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/token_auth_backend_role). +Refer to the Terraform Registry for docs: [`vault_token_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/token_auth_backend_role). diff --git a/src/token-auth-backend-role/index.ts b/src/token-auth-backend-role/index.ts index e571a3e8..507698bc 100644 --- a/src/token-auth-backend-role/index.ts +++ b/src/token-auth-backend-role/index.ts @@ -557,4 +557,132 @@ export class TokenAuthBackendRole extends cdktf.TerraformResource { token_type: cdktf.stringToTerraform(this._tokenType), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + allowed_entity_aliases: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._allowedEntityAliases), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + allowed_policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._allowedPolicies), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + allowed_policies_glob: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._allowedPoliciesGlob), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + disallowed_policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._disallowedPolicies), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + disallowed_policies_glob: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._disallowedPoliciesGlob), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + orphan: { + value: cdktf.booleanToHclTerraform(this._orphan), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + path_suffix: { + value: cdktf.stringToHclTerraform(this._pathSuffix), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + renewable: { + value: cdktf.booleanToHclTerraform(this._renewable), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + role_name: { + value: cdktf.stringToHclTerraform(this._roleName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + token_bound_cidrs: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenBoundCidrs), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_explicit_max_ttl: { + value: cdktf.numberToHclTerraform(this._tokenExplicitMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_max_ttl: { + value: cdktf.numberToHclTerraform(this._tokenMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_no_default_policy: { + value: cdktf.booleanToHclTerraform(this._tokenNoDefaultPolicy), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + token_num_uses: { + value: cdktf.numberToHclTerraform(this._tokenNumUses), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_period: { + value: cdktf.numberToHclTerraform(this._tokenPeriod), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._tokenPolicies), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + token_ttl: { + value: cdktf.numberToHclTerraform(this._tokenTtl), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + token_type: { + value: cdktf.stringToHclTerraform(this._tokenType), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/token/README.md b/src/token/README.md index 25f7da1b..0b0adccf 100644 --- a/src/token/README.md +++ b/src/token/README.md @@ -1,3 +1,3 @@ # `vault_token` -Refer to the Terraform Registory for docs: [`vault_token`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/token). +Refer to the Terraform Registry for docs: [`vault_token`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/token). diff --git a/src/token/index.ts b/src/token/index.ts index 85340e80..2a753789 100644 --- a/src/token/index.ts +++ b/src/token/index.ts @@ -489,4 +489,108 @@ export class Token extends cdktf.TerraformResource { wrapping_ttl: cdktf.stringToTerraform(this._wrappingTtl), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + display_name: { + value: cdktf.stringToHclTerraform(this._displayName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + explicit_max_ttl: { + value: cdktf.stringToHclTerraform(this._explicitMaxTtl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + metadata: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(this._metadata), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + no_default_policy: { + value: cdktf.booleanToHclTerraform(this._noDefaultPolicy), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + no_parent: { + value: cdktf.booleanToHclTerraform(this._noParent), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + num_uses: { + value: cdktf.numberToHclTerraform(this._numUses), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + period: { + value: cdktf.stringToHclTerraform(this._period), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + policies: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._policies), + isBlock: false, + type: "set", + storageClassType: "stringList", + }, + renew_increment: { + value: cdktf.numberToHclTerraform(this._renewIncrement), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + renew_min_lease: { + value: cdktf.numberToHclTerraform(this._renewMinLease), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + renewable: { + value: cdktf.booleanToHclTerraform(this._renewable), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + role_name: { + value: cdktf.stringToHclTerraform(this._roleName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + ttl: { + value: cdktf.stringToHclTerraform(this._ttl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + wrapping_ttl: { + value: cdktf.stringToHclTerraform(this._wrappingTtl), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/transform-alphabet/README.md b/src/transform-alphabet/README.md index 636d499b..96e7c387 100644 --- a/src/transform-alphabet/README.md +++ b/src/transform-alphabet/README.md @@ -1,3 +1,3 @@ # `vault_transform_alphabet` -Refer to the Terraform Registory for docs: [`vault_transform_alphabet`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/transform_alphabet). +Refer to the Terraform Registry for docs: [`vault_transform_alphabet`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/transform_alphabet). diff --git a/src/transform-alphabet/index.ts b/src/transform-alphabet/index.ts index 73854849..366283e4 100644 --- a/src/transform-alphabet/index.ts +++ b/src/transform-alphabet/index.ts @@ -194,4 +194,42 @@ export class TransformAlphabet extends cdktf.TerraformResource { path: cdktf.stringToTerraform(this._path), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + alphabet: { + value: cdktf.stringToHclTerraform(this._alphabet), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/transform-role/README.md b/src/transform-role/README.md index 70176a4b..e2d04ed4 100644 --- a/src/transform-role/README.md +++ b/src/transform-role/README.md @@ -1,3 +1,3 @@ # `vault_transform_role` -Refer to the Terraform Registory for docs: [`vault_transform_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/transform_role). +Refer to the Terraform Registry for docs: [`vault_transform_role`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/transform_role). diff --git a/src/transform-role/index.ts b/src/transform-role/index.ts index 4504a922..e443e8ff 100644 --- a/src/transform-role/index.ts +++ b/src/transform-role/index.ts @@ -194,4 +194,42 @@ export class TransformRole extends cdktf.TerraformResource { transformations: cdktf.listMapper(cdktf.stringToTerraform, false)(this._transformations), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + transformations: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._transformations), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/transform-template/README.md b/src/transform-template/README.md index 26a43243..943aa990 100644 --- a/src/transform-template/README.md +++ b/src/transform-template/README.md @@ -1,3 +1,3 @@ # `vault_transform_template` -Refer to the Terraform Registory for docs: [`vault_transform_template`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/transform_template). +Refer to the Terraform Registry for docs: [`vault_transform_template`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/transform_template). diff --git a/src/transform-template/index.ts b/src/transform-template/index.ts index 868bf0dc..76b4a7fc 100644 --- a/src/transform-template/index.ts +++ b/src/transform-template/index.ts @@ -292,4 +292,66 @@ export class TransformTemplate extends cdktf.TerraformResource { type: cdktf.stringToTerraform(this._type), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + alphabet: { + value: cdktf.stringToHclTerraform(this._alphabet), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + decode_formats: { + value: cdktf.hashMapperHcl(cdktf.stringToHclTerraform)(this._decodeFormats), + isBlock: false, + type: "map", + storageClassType: "stringMap", + }, + encode_format: { + value: cdktf.stringToHclTerraform(this._encodeFormat), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + pattern: { + value: cdktf.stringToHclTerraform(this._pattern), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + type: { + value: cdktf.stringToHclTerraform(this._type), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/transform-transformation/README.md b/src/transform-transformation/README.md index 953387f4..e0b3db36 100644 --- a/src/transform-transformation/README.md +++ b/src/transform-transformation/README.md @@ -1,3 +1,3 @@ # `vault_transform_transformation` -Refer to the Terraform Registory for docs: [`vault_transform_transformation`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/transform_transformation). +Refer to the Terraform Registry for docs: [`vault_transform_transformation`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/transform_transformation). diff --git a/src/transform-transformation/index.ts b/src/transform-transformation/index.ts index 65d215d4..9ab2ca07 100644 --- a/src/transform-transformation/index.ts +++ b/src/transform-transformation/index.ts @@ -338,4 +338,78 @@ export class TransformTransformation extends cdktf.TerraformResource { type: cdktf.stringToTerraform(this._type), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + allowed_roles: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._allowedRoles), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + deletion_allowed: { + value: cdktf.booleanToHclTerraform(this._deletionAllowed), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + masking_character: { + value: cdktf.stringToHclTerraform(this._maskingCharacter), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + template: { + value: cdktf.stringToHclTerraform(this._template), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + templates: { + value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._templates), + isBlock: false, + type: "list", + storageClassType: "stringList", + }, + tweak_source: { + value: cdktf.stringToHclTerraform(this._tweakSource), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + type: { + value: cdktf.stringToHclTerraform(this._type), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/transit-secret-backend-key/README.md b/src/transit-secret-backend-key/README.md index efe6223a..53cafb9d 100644 --- a/src/transit-secret-backend-key/README.md +++ b/src/transit-secret-backend-key/README.md @@ -1,3 +1,3 @@ # `vault_transit_secret_backend_key` -Refer to the Terraform Registory for docs: [`vault_transit_secret_backend_key`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/transit_secret_backend_key). +Refer to the Terraform Registry for docs: [`vault_transit_secret_backend_key`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/transit_secret_backend_key). diff --git a/src/transit-secret-backend-key/index.ts b/src/transit-secret-backend-key/index.ts index 0ae185f0..b41e7ac2 100644 --- a/src/transit-secret-backend-key/index.ts +++ b/src/transit-secret-backend-key/index.ts @@ -470,4 +470,102 @@ export class TransitSecretBackendKey extends cdktf.TerraformResource { type: cdktf.stringToTerraform(this._type), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + allow_plaintext_backup: { + value: cdktf.booleanToHclTerraform(this._allowPlaintextBackup), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + auto_rotate_interval: { + value: cdktf.numberToHclTerraform(this._autoRotateInterval), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + auto_rotate_period: { + value: cdktf.numberToHclTerraform(this._autoRotatePeriod), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + convergent_encryption: { + value: cdktf.booleanToHclTerraform(this._convergentEncryption), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + deletion_allowed: { + value: cdktf.booleanToHclTerraform(this._deletionAllowed), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + derived: { + value: cdktf.booleanToHclTerraform(this._derived), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + exportable: { + value: cdktf.booleanToHclTerraform(this._exportable), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + key_size: { + value: cdktf.numberToHclTerraform(this._keySize), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + min_decryption_version: { + value: cdktf.numberToHclTerraform(this._minDecryptionVersion), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + min_encryption_version: { + value: cdktf.numberToHclTerraform(this._minEncryptionVersion), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + type: { + value: cdktf.stringToHclTerraform(this._type), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/src/transit-secret-cache-config/README.md b/src/transit-secret-cache-config/README.md index ae1f5889..b32df6ed 100644 --- a/src/transit-secret-cache-config/README.md +++ b/src/transit-secret-cache-config/README.md @@ -1,3 +1,3 @@ # `vault_transit_secret_cache_config` -Refer to the Terraform Registory for docs: [`vault_transit_secret_cache_config`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/transit_secret_cache_config). +Refer to the Terraform Registry for docs: [`vault_transit_secret_cache_config`](https://registry.terraform.io/providers/hashicorp/vault/3.23.0/docs/resources/transit_secret_cache_config). diff --git a/src/transit-secret-cache-config/index.ts b/src/transit-secret-cache-config/index.ts index f9c1c5be..674535e1 100644 --- a/src/transit-secret-cache-config/index.ts +++ b/src/transit-secret-cache-config/index.ts @@ -170,4 +170,36 @@ export class TransitSecretCacheConfig extends cdktf.TerraformResource { size: cdktf.numberToTerraform(this._size), }; } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + size: { + value: cdktf.numberToHclTerraform(this._size), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } } diff --git a/yarn.lock b/yarn.lock index 2bb54928..07dd9eb0 100644 --- a/yarn.lock +++ b/yarn.lock @@ -18,7 +18,7 @@ tunnel "^0.0.6" undici "^5.25.4" -"@babel/code-frame@^7.0.0", "@babel/code-frame@^7.22.13": +"@babel/code-frame@^7.0.0", "@babel/code-frame@^7.18.6": version "7.23.5" resolved "https://registry.yarnpkg.com/@babel/code-frame/-/code-frame-7.23.5.tgz#9009b69a8c602293476ad598ff53e4562e15c244" integrity sha512-CgH3s1a96LipHCmSUmYFPwY7MNx8C3avkq7i4Wl3cfa662ldtUe4VM1TPXX70pfmrlWTb6jLqTYrZyT2ZTJBgA== @@ -26,22 +26,22 @@ "@babel/highlight" "^7.23.4" chalk "^2.4.2" -"@babel/generator@^7.21.4": - version "7.23.6" - resolved "https://registry.yarnpkg.com/@babel/generator/-/generator-7.23.6.tgz#9e1fca4811c77a10580d17d26b57b036133f3c2e" - integrity sha512-qrSfCYxYQB5owCmGLbl8XRpX1ytXlpueOb0N0UmQwA073KZxejgQTzAmJezxvpwQD9uGtK2shHdi55QT+MbjIw== +"@babel/generator@7.21.4": + version "7.21.4" + resolved "https://registry.yarnpkg.com/@babel/generator/-/generator-7.21.4.tgz#64a94b7448989f421f919d5239ef553b37bb26bc" + integrity sha512-NieM3pVIYW2SwGzKoqfPrQsf4xGs9M9AIG3ThppsSRmO+m7eQhmI6amajKMUeIO37wFfsvnvcxQFx6x6iqxDnA== dependencies: - "@babel/types" "^7.23.6" + "@babel/types" "^7.21.4" "@jridgewell/gen-mapping" "^0.3.2" "@jridgewell/trace-mapping" "^0.3.17" jsesc "^2.5.1" -"@babel/helper-string-parser@^7.23.4": +"@babel/helper-string-parser@^7.19.4", "@babel/helper-string-parser@^7.23.4": version "7.23.4" resolved "https://registry.yarnpkg.com/@babel/helper-string-parser/-/helper-string-parser-7.23.4.tgz#9478c707febcbbe1ddb38a3d91a2e054ae622d83" integrity sha512-803gmbQdqwdf4olxrX4AJyFBV/RTr3rSmOj0rKwesmzlfhYNDEs+/iOcznzpNWlJlIlTJC2QfPFcHB6DlzdVLQ== -"@babel/helper-validator-identifier@^7.22.20": +"@babel/helper-validator-identifier@^7.19.1", "@babel/helper-validator-identifier@^7.22.20": version "7.22.20" resolved "https://registry.yarnpkg.com/@babel/helper-validator-identifier/-/helper-validator-identifier-7.22.20.tgz#c4ae002c61d2879e724581d96665583dbc1dc0e0" integrity sha512-Y4OZ+ytlatR8AI+8KZfKuL5urKp7qey08ha31L8b3BwewJAoJamTzyvxPR/5D+KkdJCGPq/+8TukHBlY10FX9A== @@ -55,21 +55,30 @@ chalk "^2.4.2" js-tokens "^4.0.0" -"@babel/parser@^7.22.15": +"@babel/parser@^7.20.7": version "7.23.6" resolved "https://registry.yarnpkg.com/@babel/parser/-/parser-7.23.6.tgz#ba1c9e512bda72a47e285ae42aff9d2a635a9e3b" integrity sha512-Z2uID7YJ7oNvAI20O9X0bblw7Qqs8Q2hFy0R9tAfnfLkp5MW0UH9eUvnDSnFwKZ0AvgS1ucqR4KzvVHgnke1VQ== -"@babel/template@^7.20.7": - version "7.22.15" - resolved "https://registry.yarnpkg.com/@babel/template/-/template-7.22.15.tgz#09576efc3830f0430f4548ef971dde1350ef2f38" - integrity sha512-QPErUVm4uyJa60rkI73qneDacvdvzxshT3kksGqlGWYdOTIUOwJ7RDUL8sGqslY1uXWSL6xMFKEXDS3ox2uF0w== +"@babel/template@7.20.7": + version "7.20.7" + resolved "https://registry.yarnpkg.com/@babel/template/-/template-7.20.7.tgz#a15090c2839a83b02aa996c0b4994005841fd5a8" + integrity sha512-8SegXApWe6VoNw0r9JHpSteLKTpTiLZ4rMlGIm9JQ18KiCtyQiAMEazujAHrUS5flrcqYZa75ukev3P6QmUwUw== + dependencies: + "@babel/code-frame" "^7.18.6" + "@babel/parser" "^7.20.7" + "@babel/types" "^7.20.7" + +"@babel/types@7.21.4": + version "7.21.4" + resolved "https://registry.yarnpkg.com/@babel/types/-/types-7.21.4.tgz#2d5d6bb7908699b3b416409ffd3b5daa25b030d4" + integrity sha512-rU2oY501qDxE8Pyo7i/Orqma4ziCOrby0/9mvbDUGEfvZjb279Nk9k19e2fiCxHbRRpY2ZyrgW1eq22mvmOIzA== dependencies: - "@babel/code-frame" "^7.22.13" - "@babel/parser" "^7.22.15" - "@babel/types" "^7.22.15" + "@babel/helper-string-parser" "^7.19.4" + "@babel/helper-validator-identifier" "^7.19.1" + to-fast-properties "^2.0.0" -"@babel/types@^7.21.4", "@babel/types@^7.22.15", "@babel/types@^7.23.6": +"@babel/types@^7.20.7", "@babel/types@^7.21.4": version "7.23.6" resolved "https://registry.yarnpkg.com/@babel/types/-/types-7.23.6.tgz#be33fdb151e1f5a56877d704492c240fc71c7ccd" integrity sha512-+uarb83brBzPKN38NX1MkB6vb6+mwvR6amUulqAE7ccQw1pEl+bCia9TbdG1lsnFP7lZySvUn37CHyXQdfTwzg== @@ -78,105 +87,113 @@ "@babel/helper-validator-identifier" "^7.22.20" to-fast-properties "^2.0.0" -"@cdktf/cli-core@0.19.2": - version "0.19.2" - resolved "https://registry.yarnpkg.com/@cdktf/cli-core/-/cli-core-0.19.2.tgz#09664244498eb44b31e3f2a374a9e8d13e170feb" - integrity sha512-kjgEUhrHx3kUPfL7KsTo6GrurVUPT77FmOUf7wWXt7ajNE5zCPvx/HKGmQruzt0n6eLZp1aKT+r/D6YRfXcIGA== +"@cdktf/cli-core@0.20.0": + version "0.20.0" + resolved "https://registry.yarnpkg.com/@cdktf/cli-core/-/cli-core-0.20.0.tgz#df254e3d38c8dfd6bf966e166465abeb8367b931" + integrity sha512-qTPWHi7d2jHd8eaeFMOU4Ybc8GfyhIGS3Ktq4tUgccrmUnhGOJ8b/CIa2kWTPk27gokz5SWj3p866FNYKV0aGQ== dependencies: - "@cdktf/commons" "0.19.2" - "@cdktf/hcl2cdk" "0.19.2" - "@cdktf/hcl2json" "0.19.2" + "@cdktf/commons" "0.20.0" + "@cdktf/hcl-tools" "0.20.0" + "@cdktf/hcl2cdk" "0.20.0" + "@cdktf/hcl2json" "0.20.0" "@cdktf/node-pty-prebuilt-multiarch" "0.10.1-pre.11" - "@cdktf/provider-schema" "0.19.2" - "@sentry/node" "^7.64.0" - archiver "^5.3.1" - cdktf "0.19.2" - chalk "^4.1.2" - chokidar "^3.5.3" - cli-spinners "2.7.0" - codemaker "^1.86.1" - constructs "^10.0.25" - cross-fetch "^3.1.5" - cross-spawn "^7.0.3" - detect-port "^1.5.1" - execa "^5.1.1" - extract-zip "^2.0.1" - follow-redirects "^1.15.2" - fs-extra "^8.1.0" - https-proxy-agent "^5.0.1" - indent-string "^4.0.0" - ink "^3.2.0" - ink-select-input "^4.2.1" - ink-spinner "^4.0.3" - ink-testing-library "^2.1.0" - ink-use-stdout-dimensions "^1.0.5" - jsii "^5.1.10" - jsii-pacmak "^1.87.0" - jsii-srcmak "^0.1.951" - lodash.isequal "^4.5.0" - log4js "^6.7.0" - minimatch "^5.1.0" - node-fetch "^2.6.7" - open "^7.4.2" - parse-gitignore "^1.0.1" - pkg-up "^3.1.0" - semver "^7.5.3" - sscaff "^1.2.274" - stream-buffers "^3.0.2" - strip-ansi "^6.0.1" - tunnel-agent "^0.6.0" - uuid "^8.3.2" - xml-js "^1.6.11" - xstate "^4.34.0" - yargs "^17.6" - yoga-layout-prebuilt "^1.10.0" - zod "^3.22.4" - -"@cdktf/commons@0.19.2": - version "0.19.2" - resolved "https://registry.yarnpkg.com/@cdktf/commons/-/commons-0.19.2.tgz#3971e5a797f506d8b0468b9d36ed4074a6f936d8" - integrity sha512-5rOeb0cSREHQa5XVsGFEV6Ce8Zwo2WxE8GIhmGd/JzeSAByhK8scHFlD3+eENl83W/8lwIkm/nSl9oDHEkENIg== - dependencies: - "@sentry/node" "^7.77.0" - cdktf "0.19.2" - ci-info "^3.9.0" - codemaker "^1.91.0" - constructs "^10.0.25" - cross-spawn "^7.0.3" - follow-redirects "^1.15.3" - fs-extra "^11.1.1" - is-valid-domain "^0.1.6" - log4js "^6.9.1" - uuid "^9.0.1" - -"@cdktf/hcl2cdk@0.19.2": - version "0.19.2" - resolved "https://registry.yarnpkg.com/@cdktf/hcl2cdk/-/hcl2cdk-0.19.2.tgz#1b3555e920f37994444479eda4c0635e8d1cdbd8" - integrity sha512-v0UNRvvzuCi3SnmSAgBFAnWavT0ybR1AzkK8ndgfbB5JLDoNm0iJV0MOTURZF+I0O3V9u4RZsw4DVNPdil2EEA== - dependencies: - "@babel/generator" "^7.21.4" - "@babel/template" "^7.20.7" - "@babel/types" "^7.21.4" - "@cdktf/commons" "0.19.2" - "@cdktf/hcl2json" "0.19.2" - "@cdktf/provider-generator" "0.19.2" - "@cdktf/provider-schema" "0.19.2" - camelcase "^6.3.0" - deep-equal "^2.2.0" - glob "^10.3.3" - graphology "^0.25.1" - graphology-types "^0.24.7" - jsii-rosetta "^5.1.9" - prettier "^2.8.6" - reserved-words "^0.1.2" - zod "^3.22.4" - -"@cdktf/hcl2json@0.19.2": - version "0.19.2" - resolved "https://registry.yarnpkg.com/@cdktf/hcl2json/-/hcl2json-0.19.2.tgz#0065981462a8bc48bd3bbf4d64a6c1c4ecbc801b" - integrity sha512-gFj36AshWSyPKq/eNjQtMnWj0QM0tPtMulFpQ0FrB+eWj0GvxgWg9d65gGCZ8Y/o33VV/2Kv5l8VlDEYDW2S7Q== - dependencies: - fs-extra "^11.1.1" + "@cdktf/provider-schema" "0.20.0" + "@sentry/node" "7.91.0" + archiver "5.3.2" + cdktf "0.20.0" + chalk "4.1.2" + chokidar "3.5.3" + cli-spinners "2.9.2" + codemaker "1.93.0" + constructs "10.1.167" + cross-fetch "3.1.8" + cross-spawn "7.0.3" + detect-port "1.5.1" + execa "5.1.1" + extract-zip "2.0.1" + follow-redirects "1.15.4" + fs-extra "8.1.0" + https-proxy-agent "5.0.1" + indent-string "4.0.0" + ink "3.2.0" + ink-select-input "4.2.2" + ink-spinner "4.0.3" + ink-testing-library "2.1.0" + ink-use-stdout-dimensions "1.0.5" + jsii "5.3.3" + jsii-pacmak "1.93.0" + jsii-srcmak "0.1.999" + lodash.isequal "4.5.0" + log4js "6.9.1" + minimatch "5.1.6" + node-fetch "2.7.0" + open "7.4.2" + parse-gitignore "1.0.1" + pkg-up "3.1.0" + semver "7.5.4" + sscaff "1.2.274" + stream-buffers "3.0.2" + strip-ansi "6.0.1" + tunnel-agent "0.6.0" + uuid "8.3.2" + xml-js "1.6.11" + xstate "4.38.3" + yargs "17.7.2" + yoga-layout-prebuilt "1.10.0" + zod "3.22.4" + +"@cdktf/commons@0.20.0": + version "0.20.0" + resolved "https://registry.yarnpkg.com/@cdktf/commons/-/commons-0.20.0.tgz#36c4b187b94b8632b5ca0d155cfc642b7db89f1c" + integrity sha512-LWggwICmeN6XYfbwuOnO8rXr5lVKS6SzQFELLCXZZepFkRCQ5puR0BDKzObjaN6Fkh9eQj+hmLfyW2xwZkP0XA== + dependencies: + "@sentry/node" "7.92.0" + cdktf "0.20.0" + ci-info "3.9.0" + codemaker "1.93.0" + cross-spawn "7.0.3" + follow-redirects "1.15.4" + fs-extra "11.2.0" + is-valid-domain "0.1.6" + log4js "6.9.1" + strip-ansi "6.0.1" + uuid "9.0.1" + +"@cdktf/hcl-tools@0.20.0": + version "0.20.0" + resolved "https://registry.yarnpkg.com/@cdktf/hcl-tools/-/hcl-tools-0.20.0.tgz#a6b13ff20d9c76ddfea159e9f70f9f36080c29ee" + integrity sha512-nFhexOABmO3nOEjgaO3hC6oZFJ7YkFC9WtUOEsvUSJ44oemnfovR38KMyV1SD82r2X6QhRhxJMd6G1n6/iNxKw== + +"@cdktf/hcl2cdk@0.20.0": + version "0.20.0" + resolved "https://registry.yarnpkg.com/@cdktf/hcl2cdk/-/hcl2cdk-0.20.0.tgz#8ce637e829e5b9f06777c71a25cd3210e954053f" + integrity sha512-H9yEC5dtu1EajFKRaSje5ZVQCxjJtAJQHk2g9njoIoUAEl9jfcG2/MbYmeKUN/FBpdyl7gYS/ZweEuVdzcOVVg== + dependencies: + "@babel/generator" "7.21.4" + "@babel/template" "7.20.7" + "@babel/types" "7.21.4" + "@cdktf/commons" "0.20.0" + "@cdktf/hcl2json" "0.20.0" + "@cdktf/provider-generator" "0.20.0" + "@cdktf/provider-schema" "0.20.0" + camelcase "6.3.0" + cdktf "0.20.0" + codemaker "1.93.0" + deep-equal "2.2.0" + glob "10.3.3" + graphology "0.25.1" + graphology-types "0.24.7" + jsii-rosetta "5.3.2" + prettier "2.8.7" + reserved-words "0.1.2" + zod "3.22.4" + +"@cdktf/hcl2json@0.20.0": + version "0.20.0" + resolved "https://registry.yarnpkg.com/@cdktf/hcl2json/-/hcl2json-0.20.0.tgz#4c1d3f1169165d24ac4a229504210544bd90cd9d" + integrity sha512-de5GaNsJqKX934EJG5xnsbpvyVf99f36/7ScK53znsbamnTJvl791fCR/tgkF+zrmZYAw0QSSEX1bHY4IPluzw== + dependencies: + fs-extra "11.2.0" "@cdktf/node-pty-prebuilt-multiarch@0.10.1-pre.11": version "0.10.1-pre.11" @@ -186,35 +203,36 @@ nan "^2.14.2" prebuild-install "^7.1.1" -"@cdktf/provider-generator@0.19.2": - version "0.19.2" - resolved "https://registry.yarnpkg.com/@cdktf/provider-generator/-/provider-generator-0.19.2.tgz#142c191458b2793617a57d53785acb7823357558" - integrity sha512-e8fY/FtvlwMupp8zGGzAeAyW5yq4jhY+azL5kfXAXck2kO7hpimKflhycGGBm2aVTuOAmsmrumgEkCa6+7vmSg== - dependencies: - "@cdktf/commons" "0.19.2" - "@cdktf/hcl2json" "0.19.2" - "@cdktf/provider-schema" "0.19.2" - "@types/node" "18.18.8" - codemaker "^1.91.0" - deepmerge "^4.3.1" - fs-extra "^8.1.0" - jsii-srcmak "^0.1.954" +"@cdktf/provider-generator@0.20.0": + version "0.20.0" + resolved "https://registry.yarnpkg.com/@cdktf/provider-generator/-/provider-generator-0.20.0.tgz#27bdb2df126f15712ed0c77345ee99d33d12fd90" + integrity sha512-fpThfmaYOJhQv7uVSBKBfhbFpYpH6yEOunMq9tfmlf+rJhRaJ7+o5dIwqKmcLxOGn0OOyg55PzoPVG1rhoPJ3w== + dependencies: + "@cdktf/commons" "0.20.0" + "@cdktf/provider-schema" "0.20.0" + "@types/node" "18.19.5" + codemaker "1.93.0" + fs-extra "8.1.0" + glob "10.3.10" + jsii-srcmak "0.1.999" "@cdktf/provider-project@^0.5.0": - version "0.5.8" - resolved "https://registry.yarnpkg.com/@cdktf/provider-project/-/provider-project-0.5.8.tgz#11d0f87c9b02aaf705eecd89f1f820cb0c7a3248" - integrity sha512-tWQC5L4yh9w6GVYHTWMpmzBUcRKp6sdFO39sjUqFcKTt2yLy/MCbE/YRJ/gxX3ES4K/Fc+nk05DbbbnJkISxIQ== + version "0.5.9" + resolved "https://registry.yarnpkg.com/@cdktf/provider-project/-/provider-project-0.5.9.tgz#172ee61de1335f61f8065ba19d22a87a6030aa79" + integrity sha512-2IWkVmsc8TL0ZK18Tp4eGxB9H26Bt2bEXonD+aLAq33gmziq6CnYRbv9R9m2+u9Q3SIEOaE0VqofcsOZlgJkSw== dependencies: change-case "^4.1.2" fs-extra "^10.1.0" -"@cdktf/provider-schema@0.19.2": - version "0.19.2" - resolved "https://registry.yarnpkg.com/@cdktf/provider-schema/-/provider-schema-0.19.2.tgz#a97c07027b3293615994ed7b614e9214f45dede7" - integrity sha512-d6YghOMsDPqQS8DRS+h5BMwg6I0QVwNi8iE9bX+pGXHa/hYggXE97sAMUGFcW3za+gSCOImHYvvKDVc3u3KsOA== +"@cdktf/provider-schema@0.20.0": + version "0.20.0" + resolved "https://registry.yarnpkg.com/@cdktf/provider-schema/-/provider-schema-0.20.0.tgz#1954ce1d7046bc4f005d9b16d589caf84ad9ea3d" + integrity sha512-wUK4qxRQiGLVsxoF6UcFbMhpfJpaeCwAngn43wr3LwNwTCjogdMt+0aK2YgJsnov5pnt2kK6mVHMxmWhm7pgMw== dependencies: - "@cdktf/commons" "0.19.2" - fs-extra "^11.1.1" + "@cdktf/commons" "0.20.0" + "@cdktf/hcl2json" "0.20.0" + deepmerge "4.3.1" + fs-extra "11.2.0" "@fastify/busboy@^2.0.0": version "2.1.0" @@ -231,7 +249,7 @@ resolved "https://registry.yarnpkg.com/@iarna/toml/-/toml-2.2.5.tgz#b32366c89b43c6f8cefbdefac778b9c828e3ba8c" integrity sha512-trnsAYxU3xnS1gPHPyU961coFyLkh4gAD/0zQ5mymY4yOZ+CYvsPqUbOFSw0aDM4y0tV7tiFxL/1XfXPNC6IPg== -"@inquirer/checkbox@^1.3.4": +"@inquirer/checkbox@^1.3.3": version "1.5.0" resolved "https://registry.yarnpkg.com/@inquirer/checkbox/-/checkbox-1.5.0.tgz#05869b4ee81e2c8d523799ef350d57cabd556bfa" integrity sha512-3cKJkW1vIZAs4NaS0reFsnpAjP0azffYII4I2R7PTI7ZTMg5Y1at4vzXccOH3762b2c2L4drBhpJpf9uiaGNxA== @@ -242,7 +260,7 @@ chalk "^4.1.2" figures "^3.2.0" -"@inquirer/confirm@^2.0.5": +"@inquirer/confirm@^2.0.4": version "2.0.15" resolved "https://registry.yarnpkg.com/@inquirer/confirm/-/confirm-2.0.15.tgz#b5512ed190efd8c5b96e0969115756b48546ab36" integrity sha512-hj8Q/z7sQXsF0DSpLQZVDhWYGN6KLM/gNjjqGkpKwBzljbQofGjn0ueHADy4HUY+OqDHmXuwk/bY+tZyIuuB0w== @@ -251,7 +269,7 @@ "@inquirer/type" "^1.1.5" chalk "^4.1.2" -"@inquirer/core@^2.3.1": +"@inquirer/core@^2.3.0": version "2.3.1" resolved "https://registry.yarnpkg.com/@inquirer/core/-/core-2.3.1.tgz#b7a1563ef3830a20485f551257779657e843e53f" integrity sha512-faYAYnIfdEuns3jGKykaog5oUqFiEVbCx9nXGZfUhyEEpKcHt5bpJfZTb3eOBQKo8I/v4sJkZeBHmFlSZQuBCw== @@ -291,7 +309,7 @@ strip-ansi "^6.0.1" wrap-ansi "^6.2.0" -"@inquirer/editor@^1.2.3": +"@inquirer/editor@^1.2.2": version "1.2.13" resolved "https://registry.yarnpkg.com/@inquirer/editor/-/editor-1.2.13.tgz#94bddeeabc043d4a05fbde8523add4db221555d5" integrity sha512-gBxjqt0B9GLN0j6M/tkEcmcIvB2fo9Cw0f5NRqDTkYyB9AaCzj7qvgG0onQ3GVPbMyMbbP4tWYxrBOaOdKpzNA== @@ -301,7 +319,7 @@ chalk "^4.1.2" external-editor "^3.1.0" -"@inquirer/expand@^1.1.4": +"@inquirer/expand@^1.1.3": version "1.1.14" resolved "https://registry.yarnpkg.com/@inquirer/expand/-/expand-1.1.14.tgz#d315014939d0bb82ed2b769907db5bd1922fb823" integrity sha512-yS6fJ8jZYAsxdxuw2c8XTFMTvMR1NxZAw3LxDaFnqh7BZ++wTQ6rSp/2gGJhMacdZ85osb+tHxjVgx7F+ilv5g== @@ -311,7 +329,7 @@ chalk "^4.1.2" figures "^3.2.0" -"@inquirer/input@^1.2.14", "@inquirer/input@^1.2.4": +"@inquirer/input@^1.2.14", "@inquirer/input@^1.2.3": version "1.2.14" resolved "https://registry.yarnpkg.com/@inquirer/input/-/input-1.2.14.tgz#8951867618bb5cd16dd096e02404eec225a92207" integrity sha512-tISLGpUKXixIQue7jypNEShrdzJoLvEvZOJ4QRsw5XTfrIYfoWFqAjMQLerGs9CzR86yAI89JR6snHmKwnNddw== @@ -320,7 +338,7 @@ "@inquirer/type" "^1.1.5" chalk "^4.1.2" -"@inquirer/password@^1.1.4": +"@inquirer/password@^1.1.3": version "1.1.14" resolved "https://registry.yarnpkg.com/@inquirer/password/-/password-1.1.14.tgz#c1fc139efe84a38986870a1bcf80718050f82bbf" integrity sha512-vL2BFxfMo8EvuGuZYlryiyAB3XsgtbxOcFs4H9WI9szAS/VZCAwdVqs8rqEeaAf/GV/eZOghIOYxvD91IsRWSg== @@ -330,22 +348,22 @@ ansi-escapes "^4.3.2" chalk "^4.1.2" -"@inquirer/prompts@^2.3.0": - version "2.3.1" - resolved "https://registry.yarnpkg.com/@inquirer/prompts/-/prompts-2.3.1.tgz#fe430f96e510cf352efeb77af2dbd6d3049e677c" - integrity sha512-YQeBFzIE+6fcec5N/U2mSz+IcKEG4wtGDwF7MBLIDgITWzB3o723JpKJ1rxWqdCvTXkYE+gDXK/seSN6omo3DQ== - dependencies: - "@inquirer/checkbox" "^1.3.4" - "@inquirer/confirm" "^2.0.5" - "@inquirer/core" "^2.3.1" - "@inquirer/editor" "^1.2.3" - "@inquirer/expand" "^1.1.4" - "@inquirer/input" "^1.2.4" - "@inquirer/password" "^1.1.4" - "@inquirer/rawlist" "^1.2.4" - "@inquirer/select" "^1.2.4" - -"@inquirer/rawlist@^1.2.4": +"@inquirer/prompts@2.3.0": + version "2.3.0" + resolved "https://registry.yarnpkg.com/@inquirer/prompts/-/prompts-2.3.0.tgz#b3f13d58c9c4d88b84af62ab582363fa410db8d6" + integrity sha512-x79tSDIZAibOl9WaBoOuyaQqNnisOO8Pk0qWyulP/nPaD/WkoRvkzk7hR4WTRmWAyE8CNbjdYgGltvd0qmvCGQ== + dependencies: + "@inquirer/checkbox" "^1.3.3" + "@inquirer/confirm" "^2.0.4" + "@inquirer/core" "^2.3.0" + "@inquirer/editor" "^1.2.2" + "@inquirer/expand" "^1.1.3" + "@inquirer/input" "^1.2.3" + "@inquirer/password" "^1.1.3" + "@inquirer/rawlist" "^1.2.3" + "@inquirer/select" "^1.2.3" + +"@inquirer/rawlist@^1.2.3": version "1.2.14" resolved "https://registry.yarnpkg.com/@inquirer/rawlist/-/rawlist-1.2.14.tgz#7fac491345a984bafad96817a4f5ae45fb6b0c96" integrity sha512-xIYmDpYgfz2XGCKubSDLKEvadkIZAKbehHdWF082AyC2I4eHK44RUfXaoOAqnbqItZq4KHXS6jDJ78F2BmQvxg== @@ -354,7 +372,7 @@ "@inquirer/type" "^1.1.5" chalk "^4.1.2" -"@inquirer/select@^1.2.4": +"@inquirer/select@^1.2.3": version "1.3.1" resolved "https://registry.yarnpkg.com/@inquirer/select/-/select-1.3.1.tgz#b10bb8d4ba72f08eb887b3d948eb734d680897c6" integrity sha512-EgOPHv7XOHEqiBwBJTyiMg9r57ySyW4oyYCumGp+pGyOaXQaLb2kTnccWI6NFd9HSi5kDJhF7YjA+3RfMQJ2JQ== @@ -492,6 +510,25 @@ resolved "https://registry.yarnpkg.com/@pkgjs/parseargs/-/parseargs-0.11.0.tgz#a77ea742fab25775145434eb1d2328cf5013ac33" integrity sha512-+1VkjdD0QBLPodGrJUeqarH8VAIvQODIbwh9XpP5Syisf7YoQgsJKPNFoqqLQlu+VQ/tVSshMR6loPMn8U+dPg== +"@sentry-internal/tracing@7.64.0": + version "7.64.0" + resolved "https://registry.yarnpkg.com/@sentry-internal/tracing/-/tracing-7.64.0.tgz#3e110473b8edf805b799cc91d6ee592830237bb4" + integrity sha512-1XE8W6ki7hHyBvX9hfirnGkKDBKNq3bDJyXS86E0bYVDl94nvbRM9BD9DHsCFetqYkVm1yDGEK+6aUVs4CztoQ== + dependencies: + "@sentry/core" "7.64.0" + "@sentry/types" "7.64.0" + "@sentry/utils" "7.64.0" + tslib "^2.4.1 || ^1.9.3" + +"@sentry-internal/tracing@7.91.0": + version "7.91.0" + resolved "https://registry.yarnpkg.com/@sentry-internal/tracing/-/tracing-7.91.0.tgz#fbb6e1e3383e1eeee08633384e004da73ac1c37d" + integrity sha512-JH5y6gs6BS0its7WF2DhySu7nkhPDfZcdpAXldxzIlJpqFkuwQKLU5nkYJpiIyZz1NHYYtW5aum2bV2oCOdDRA== + dependencies: + "@sentry/core" "7.91.0" + "@sentry/types" "7.91.0" + "@sentry/utils" "7.91.0" + "@sentry-internal/tracing@7.92.0": version "7.92.0" resolved "https://registry.yarnpkg.com/@sentry-internal/tracing/-/tracing-7.92.0.tgz#505d94a93b5df965ec6bfb35da43389988259d4d" @@ -501,6 +538,23 @@ "@sentry/types" "7.92.0" "@sentry/utils" "7.92.0" +"@sentry/core@7.64.0": + version "7.64.0" + resolved "https://registry.yarnpkg.com/@sentry/core/-/core-7.64.0.tgz#9d61cdc29ba299dedbdcbe01cfadf94bd0b7df48" + integrity sha512-IzmEyl5sNG7NyEFiyFHEHC+sizsZp9MEw1+RJRLX6U5RITvcsEgcajSkHQFafaBPzRrcxZMdm47Cwhl212LXcw== + dependencies: + "@sentry/types" "7.64.0" + "@sentry/utils" "7.64.0" + tslib "^2.4.1 || ^1.9.3" + +"@sentry/core@7.91.0": + version "7.91.0" + resolved "https://registry.yarnpkg.com/@sentry/core/-/core-7.91.0.tgz#229334d7f03dd5d90a17495e61ce4215ab730b2a" + integrity sha512-tu+gYq4JrTdrR+YSh5IVHF0fJi/Pi9y0HZ5H9HnYy+UMcXIotxf6hIEaC6ZKGeLWkGXffz2gKpQLe/g6vy/lPA== + dependencies: + "@sentry/types" "7.91.0" + "@sentry/utils" "7.91.0" + "@sentry/core@7.92.0": version "7.92.0" resolved "https://registry.yarnpkg.com/@sentry/core/-/core-7.92.0.tgz#4e74c1959348b698226c49ead7a24e165502b55c" @@ -509,7 +563,32 @@ "@sentry/types" "7.92.0" "@sentry/utils" "7.92.0" -"@sentry/node@^7.64.0", "@sentry/node@^7.77.0": +"@sentry/node@7.64.0": + version "7.64.0" + resolved "https://registry.yarnpkg.com/@sentry/node/-/node-7.64.0.tgz#c6f7a67c1442324298f0525e7191bc18572ee1ce" + integrity sha512-wRi0uTnp1WSa83X2yLD49tV9QPzGh5e42IKdIDBiQ7lV9JhLILlyb34BZY1pq6p4dp35yDasDrP3C7ubn7wo6A== + dependencies: + "@sentry-internal/tracing" "7.64.0" + "@sentry/core" "7.64.0" + "@sentry/types" "7.64.0" + "@sentry/utils" "7.64.0" + cookie "^0.4.1" + https-proxy-agent "^5.0.0" + lru_map "^0.3.3" + tslib "^2.4.1 || ^1.9.3" + +"@sentry/node@7.91.0": + version "7.91.0" + resolved "https://registry.yarnpkg.com/@sentry/node/-/node-7.91.0.tgz#26bf13c3daf988f9725afd1a3cc38ba2ff90d62a" + integrity sha512-hTIfSQxD7L+AKIqyjoq8CWBRkEQrrMZmA3GSZgPI5JFWBHgO0HBo5TH/8TU81oEJh6kqqHAl2ObMhmcnaFqlzg== + dependencies: + "@sentry-internal/tracing" "7.91.0" + "@sentry/core" "7.91.0" + "@sentry/types" "7.91.0" + "@sentry/utils" "7.91.0" + https-proxy-agent "^5.0.0" + +"@sentry/node@7.92.0": version "7.92.0" resolved "https://registry.yarnpkg.com/@sentry/node/-/node-7.92.0.tgz#880d3be5cb8ef805a6856c619db3951b1678f726" integrity sha512-LZeQL1r6kikEoOzA9K61OmMl32/lK/6PzmFNDH6z7UYwQopCZgVA6IP+CZuln8K2ys5c9hCyF7ICQMysXfpNJA== @@ -520,11 +599,36 @@ "@sentry/utils" "7.92.0" https-proxy-agent "^5.0.0" +"@sentry/types@7.64.0": + version "7.64.0" + resolved "https://registry.yarnpkg.com/@sentry/types/-/types-7.64.0.tgz#21fc545ea05c3c8c4c3e518583eca1a8c5429506" + integrity sha512-LqjQprWXjUFRmzIlUjyA+KL+38elgIYmAeoDrdyNVh8MK5IC1W2Lh1Q87b4yOiZeMiIhIVNBd7Ecoh2rodGrGA== + +"@sentry/types@7.91.0": + version "7.91.0" + resolved "https://registry.yarnpkg.com/@sentry/types/-/types-7.91.0.tgz#5b68954e08986fecb0d4bef168df58eef62c32c7" + integrity sha512-bcQnb7J3P3equbCUc+sPuHog2Y47yGD2sCkzmnZBjvBT0Z1B4f36fI/5WjyZhTjLSiOdg3F2otwvikbMjmBDew== + "@sentry/types@7.92.0": version "7.92.0" resolved "https://registry.yarnpkg.com/@sentry/types/-/types-7.92.0.tgz#4c308fdb316c0272f55f0816230fe87e7b9b551a" integrity sha512-APmSOuZuoRGpbPpPeYIbMSplPjiWNLZRQa73QiXuTflW4Tu/ItDlU8hOa2+A6JKVkJCuD2EN6yUrxDGSMyNXeg== +"@sentry/utils@7.64.0": + version "7.64.0" + resolved "https://registry.yarnpkg.com/@sentry/utils/-/utils-7.64.0.tgz#6fe3ce9a56d3433ed32119f914907361a54cc184" + integrity sha512-HRlM1INzK66Gt+F4vCItiwGKAng4gqzCR4C5marsL3qv6SrKH98dQnCGYgXluSWaaa56h97FRQu7TxCk6jkSvQ== + dependencies: + "@sentry/types" "7.64.0" + tslib "^2.4.1 || ^1.9.3" + +"@sentry/utils@7.91.0": + version "7.91.0" + resolved "https://registry.yarnpkg.com/@sentry/utils/-/utils-7.91.0.tgz#3b1a94c053c885877908cd3e1365e3d23e21a73f" + integrity sha512-fvxjrEbk6T6Otu++Ax9ntlQ0sGRiwSC179w68aC3u26Wr30FAIRKqHTCCdc2jyWk7Gd9uWRT/cq+g8NG/8BfSg== + dependencies: + "@sentry/types" "7.91.0" + "@sentry/utils@7.92.0": version "7.92.0" resolved "https://registry.yarnpkg.com/@sentry/utils/-/utils-7.92.0.tgz#20ed29742594eab007f9ff72e008b5262456a319" @@ -571,14 +675,7 @@ dependencies: undici-types "~5.26.4" -"@types/node@18.18.8": - version "18.18.8" - resolved "https://registry.yarnpkg.com/@types/node/-/node-18.18.8.tgz#2b285361f2357c8c8578ec86b5d097c7f464cfd6" - integrity sha512-OLGBaaK5V3VRBS1bAkMVP2/W9B+H8meUfl866OrMNQqt7wDgdpWPp5o6gmIc9pB+lIQHSq4ZL8ypeH1vPxcPaQ== - dependencies: - undici-types "~5.26.4" - -"@types/node@^18": +"@types/node@18.19.5", "@types/node@^18": version "18.19.5" resolved "https://registry.yarnpkg.com/@types/node/-/node-18.19.5.tgz#4b23a9ab8ab7dafebb57bcbaf5c3d8d04f9d8cac" integrity sha512-22MG6T02Hos2JWfa1o5jsIByn+bc5iOt1IS4xyg6OG68Bu+wMonVZzdrgCw693++rpLE9RUT/Bx15BeDzO0j+g== @@ -735,7 +832,7 @@ archiver-utils@^3.0.4: normalize-path "^3.0.0" readable-stream "^3.6.0" -archiver@5.3.2, archiver@^5.3.1: +archiver@5.3.2: version "5.3.2" resolved "https://registry.yarnpkg.com/archiver/-/archiver-5.3.2.tgz#99991d5957e53bd0303a392979276ac4ddccf3b0" integrity sha512-+25nxyyznAXF7Nef3y0EbBeqmGZgeN/BxHX29Rs39djAfaFalmQ89SE6CWyDCHzGL0yt/ycBtNOmGTW0FyGWNw== @@ -760,14 +857,6 @@ arr-rotate@^1.0.0: resolved "https://registry.yarnpkg.com/arr-rotate/-/arr-rotate-1.0.0.tgz#c11877d06a0a42beb39ab8956a06779d9b71d248" integrity sha512-yOzOZcR9Tn7enTF66bqKorGGH0F36vcPaSWg8fO0c0UYb3LX3VMXj5ZxEqQLNOecAhlRJ7wYZja5i4jTlnbIfQ== -array-buffer-byte-length@^1.0.0: - version "1.0.0" - resolved "https://registry.yarnpkg.com/array-buffer-byte-length/-/array-buffer-byte-length-1.0.0.tgz#fabe8bc193fea865f317fe7807085ee0dee5aead" - integrity sha512-LPuwb2P+NrQw3XhxGc36+XSvuBPopovXYTR9Ew++Du9Yb/bx5AzBfrIsBoj0EZUifjQU+sHL21sseZ3jerWO/A== - dependencies: - call-bind "^1.0.2" - is-array-buffer "^3.0.1" - array-ify@^1.0.0: version "1.0.0" resolved "https://registry.yarnpkg.com/array-ify/-/array-ify-1.0.0.tgz#9e528762b4a9066ad163a6962a364418e9626ece" @@ -898,16 +987,16 @@ camelcase-keys@^6.2.2: map-obj "^4.0.0" quick-lru "^4.0.1" +camelcase@6.3.0, camelcase@^6.3.0: + version "6.3.0" + resolved "https://registry.yarnpkg.com/camelcase/-/camelcase-6.3.0.tgz#5685b95eb209ac9c0c177467778c9c84df58ba9a" + integrity sha512-Gmy6FhYlCY7uOElZUSbxo2UCDH8owEk996gkbrpsgGtrJLM3J7jGxl9Ic7Qwwj4ivOE5AWZWRMecDdF7hqGjFA== + camelcase@^5.0.0, camelcase@^5.3.1: version "5.3.1" resolved "https://registry.yarnpkg.com/camelcase/-/camelcase-5.3.1.tgz#e3c9b31569e106811df242f715725a1f4c494320" integrity sha512-L28STB170nwWS63UjtlEOE3dldQApaJXZkOI1uMFfzf3rRuPegHaHesyee+YxQ+W6SvRDQV6UrdOdRiR153wJg== -camelcase@^6.3.0: - version "6.3.0" - resolved "https://registry.yarnpkg.com/camelcase/-/camelcase-6.3.0.tgz#5685b95eb209ac9c0c177467778c9c84df58ba9a" - integrity sha512-Gmy6FhYlCY7uOElZUSbxo2UCDH8owEk996gkbrpsgGtrJLM3J7jGxl9Ic7Qwwj4ivOE5AWZWRMecDdF7hqGjFA== - capital-case@^1.0.4: version "1.0.4" resolved "https://registry.yarnpkg.com/capital-case/-/capital-case-1.0.4.tgz#9d130292353c9249f6b00fa5852bee38a717e669" @@ -922,45 +1011,54 @@ case@^1.6.3: resolved "https://registry.yarnpkg.com/case/-/case-1.6.3.tgz#0a4386e3e9825351ca2e6216c60467ff5f1ea1c9" integrity sha512-mzDSXIPaFwVDvZAHqZ9VlbyF4yyXRuX6IvB06WvPYkqJVO24kX1PPhv9bfpKNFZyxYFmmgo03HUiD8iklmJYRQ== -cdktf-cli@^0.19.0: - version "0.19.2" - resolved "https://registry.yarnpkg.com/cdktf-cli/-/cdktf-cli-0.19.2.tgz#09fcab9dcc3eeca7b45c36687467b56b9d4f231a" - integrity sha512-rwd0yOJmHecOnQsnZxsKFgBO2r1AuPw34IfKSx+FSK6H7aO13Pak+tef6tlhn7f0K79Abk2ZGD3OLs8TeG+78w== - dependencies: - "@cdktf/cli-core" "0.19.2" - "@cdktf/commons" "0.19.2" - "@cdktf/hcl2cdk" "0.19.2" - "@cdktf/hcl2json" "0.19.2" - "@inquirer/prompts" "^2.3.0" - "@sentry/node" "^7.64.0" - cdktf "0.19.2" - ci-info "^3.8.0" - codemaker "^1.87.0" - constructs "^10.0.25" - cross-spawn "^7.0.3" - https-proxy-agent "^5.0.1" - ink-select-input "^4.2.1" - ink-table "^3.0.0" - jsii "^5.1.10" - jsii-pacmak "^1.87.0" - minimatch "^5.1.0" - node-fetch "^2.6.7" - pidtree "^0.6.0" - pidusage "^3.0.2" - tunnel-agent "^0.6.0" - xml-js "^1.6.11" - yargs "^17.6" - yoga-layout-prebuilt "^1.10.0" - zod "^3.22.4" - -cdktf@0.19.2, cdktf@^0.19.0: - version "0.19.2" - resolved "https://registry.yarnpkg.com/cdktf/-/cdktf-0.19.2.tgz#c93b794a9c8ac6b4e50bc24e80d06d84089a8766" - integrity sha512-FHOERDO7i2g/+pUaaZCVDKsbXEBtWYOgELL1UKjNp37DyEmtFlltdsgutVfouoil0C7W5za2IydD6sSeoH5aUw== +cdktf-cli@^0.20.0: + version "0.20.0" + resolved "https://registry.yarnpkg.com/cdktf-cli/-/cdktf-cli-0.20.0.tgz#790ea48e126770d0f1a4310b65ddadeaedd3a1d7" + integrity sha512-FN04OqrbUGE9VxqnGHRTWI0vq95LtoFAG/hrP7asFOmZFq5W5XBb+gdl9PgHUoajnl0WQnQHcS8xUQhKNhXiUQ== + dependencies: + "@cdktf/cli-core" "0.20.0" + "@cdktf/commons" "0.20.0" + "@cdktf/hcl-tools" "0.20.0" + "@cdktf/hcl2cdk" "0.20.0" + "@cdktf/hcl2json" "0.20.0" + "@inquirer/prompts" "2.3.0" + "@sentry/node" "7.64.0" + cdktf "0.20.0" + ci-info "3.8.0" + codemaker "1.93.0" + constructs "10.1.167" + cross-spawn "7.0.3" + https-proxy-agent "5.0.1" + ink-select-input "4.2.1" + ink-table "3.0.0" + jsii "5.3.2" + jsii-pacmak "1.93.0" + minimatch "5.1.0" + node-fetch "2.6.7" + pidtree "0.6.0" + pidusage "3.0.2" + tunnel-agent "0.6.0" + xml-js "1.6.11" + yargs "17.6.2" + yoga-layout-prebuilt "1.10.0" + zod "3.22.4" + +cdktf@0.20.0, cdktf@^0.20.0: + version "0.20.0" + resolved "https://registry.yarnpkg.com/cdktf/-/cdktf-0.20.0.tgz#fae129c9431350ebbf02a95129db6687ee323e43" + integrity sha512-4bCG1/7cYYGyiC++zxJ5wPUZVuxeXvZLY2BqE9heTV/PZtlcwUrV6wfUMtQFbYTCssCEJDnGrOe7Rw1Jf0Sf2w== dependencies: archiver "5.3.2" - json-stable-stringify "^1.0.2" - semver "^7.5.4" + json-stable-stringify "1.1.0" + semver "7.5.4" + +chalk@4.1.2, chalk@^4, chalk@^4.1.0, chalk@^4.1.2: + version "4.1.2" + resolved "https://registry.yarnpkg.com/chalk/-/chalk-4.1.2.tgz#aac4e2b7734a740867aeb16bf02aad556a1e7a01" + integrity sha512-oKnbhFyRIXpUuez8iBMmyEa4nbj4IOQyuhc/wy9kY7/WVPcwIO9VA668Pu8RkO7+0G76SLROeyw9CpQ061i4mA== + dependencies: + ansi-styles "^4.1.0" + supports-color "^7.1.0" chalk@^2.4.2: version "2.4.2" @@ -971,14 +1069,6 @@ chalk@^2.4.2: escape-string-regexp "^1.0.5" supports-color "^5.3.0" -chalk@^4, chalk@^4.1.0, chalk@^4.1.2: - version "4.1.2" - resolved "https://registry.yarnpkg.com/chalk/-/chalk-4.1.2.tgz#aac4e2b7734a740867aeb16bf02aad556a1e7a01" - integrity sha512-oKnbhFyRIXpUuez8iBMmyEa4nbj4IOQyuhc/wy9kY7/WVPcwIO9VA668Pu8RkO7+0G76SLROeyw9CpQ061i4mA== - dependencies: - ansi-styles "^4.1.0" - supports-color "^7.1.0" - change-case@^4.1.2: version "4.1.2" resolved "https://registry.yarnpkg.com/change-case/-/change-case-4.1.2.tgz#fedfc5f136045e2398c0410ee441f95704641e12" @@ -1002,7 +1092,7 @@ chardet@^0.7.0: resolved "https://registry.yarnpkg.com/chardet/-/chardet-0.7.0.tgz#90094849f0937f2eedc2425d0d28a9e5f0cbad9e" integrity sha512-mT8iDcrh03qDGRRmoA2hmBJnxpllMR+0/0qlzjqZES6NdiWDcZkCNAk4rPFZ9Q85r27unkiNNg8ZOiwZXBHwcA== -chokidar@^3.5.3: +chokidar@3.5.3: version "3.5.3" resolved "https://registry.yarnpkg.com/chokidar/-/chokidar-3.5.3.tgz#1cf37c8707b932bd1af1ae22c0432e2acd1903bd" integrity sha512-Dr3sfKRP6oTcjf2JmUmFJfeVMvXBdegxB0iVQ5eb2V10uFJUCAS8OByZdVAyVb8xXNz3GjjTgj9kLWsZTqE6kw== @@ -1022,16 +1112,21 @@ chownr@^1.1.1: resolved "https://registry.yarnpkg.com/chownr/-/chownr-1.1.4.tgz#6fc9d7b42d32a583596337666e7d08084da2cc6b" integrity sha512-jJ0bqzaylmJtVnNgzTeSOs8DPavpbYgEr/b0YL8/2GO3xJEhInFmhKMUnEJQjZumK7KXGFhUy89PrsJWlakBVg== -ci-info@^2.0.0: - version "2.0.0" - resolved "https://registry.yarnpkg.com/ci-info/-/ci-info-2.0.0.tgz#67a9e964be31a51e15e5010d58e6f12834002f46" - integrity sha512-5tK7EtrZ0N+OLFMthtqOj4fI2Jeb88C4CAZPu25LDVUgXJ0A3Js4PMGqrn0JU1W0Mh1/Z8wZzYPxqUrXeBboCQ== +ci-info@3.8.0: + version "3.8.0" + resolved "https://registry.yarnpkg.com/ci-info/-/ci-info-3.8.0.tgz#81408265a5380c929f0bc665d62256628ce9ef91" + integrity sha512-eXTggHWSooYhq49F2opQhuHWgzucfF2YgODK4e1566GQs5BIfP30B0oenwBJHfWxAs2fyPB1s7Mg949zLf61Yw== -ci-info@^3.8.0, ci-info@^3.9.0: +ci-info@3.9.0: version "3.9.0" resolved "https://registry.yarnpkg.com/ci-info/-/ci-info-3.9.0.tgz#4279a62028a7b1f262f3473fc9605f5e218c59b4" integrity sha512-NIxF55hv4nSqQswkAeiOi1r83xy8JldOFDTWiug55KBu9Jnblncd2U6ViHmYgHf01TPZS77NJBhBMKdWj9HQMQ== +ci-info@^2.0.0: + version "2.0.0" + resolved "https://registry.yarnpkg.com/ci-info/-/ci-info-2.0.0.tgz#67a9e964be31a51e15e5010d58e6f12834002f46" + integrity sha512-5tK7EtrZ0N+OLFMthtqOj4fI2Jeb88C4CAZPu25LDVUgXJ0A3Js4PMGqrn0JU1W0Mh1/Z8wZzYPxqUrXeBboCQ== + cli-boxes@^2.2.0: version "2.2.1" resolved "https://registry.yarnpkg.com/cli-boxes/-/cli-boxes-2.2.1.tgz#ddd5035d25094fce220e9cab40a45840a440318f" @@ -1044,12 +1139,7 @@ cli-cursor@^3.1.0: dependencies: restore-cursor "^3.1.0" -cli-spinners@2.7.0: - version "2.7.0" - resolved "https://registry.yarnpkg.com/cli-spinners/-/cli-spinners-2.7.0.tgz#f815fd30b5f9eaac02db604c7a231ed7cb2f797a" - integrity sha512-qu3pN8Y3qHNgE2AFweciB1IfMnmZ/fsNTEE+NOFjmGB2F/7rLhnhzppvpCnN4FovtP26k8lHyy9ptEbNwWFLzw== - -cli-spinners@^2.3.0, cli-spinners@^2.8.0, cli-spinners@^2.9.1: +cli-spinners@2.9.2, cli-spinners@^2.3.0, cli-spinners@^2.8.0, cli-spinners@^2.9.1: version "2.9.2" resolved "https://registry.yarnpkg.com/cli-spinners/-/cli-spinners-2.9.2.tgz#1773a8f4b9c4d6ac31563df53b3fc1d79462fe41" integrity sha512-ywqV+5MmyL4E7ybXgKys4DugZbX0FC6LnwrhjuykIjnK9k8OQacQ7axGKnjDXWNhns0xot3bZI5h55H8yo9cJg== @@ -1106,7 +1196,7 @@ code-excerpt@^3.0.0: dependencies: convert-to-spaces "^1.0.1" -codemaker@^1.86.1, codemaker@^1.87.0, codemaker@^1.91.0, codemaker@^1.93.0: +codemaker@1.93.0, codemaker@^1.93.0: version "1.93.0" resolved "https://registry.yarnpkg.com/codemaker/-/codemaker-1.93.0.tgz#4cd42eaf789678cc996581baf8ca014b505e72b4" integrity sha512-n9AdncxhGti20YhA7HI2oAYhELh/qlDnW9JIAYQW9iULXdeaKtsxHgvcwBCltpieOcQrq10bt+sUawBs62vxLg== @@ -1202,7 +1292,12 @@ constant-case@^3.0.4: tslib "^2.0.3" upper-case "^2.0.2" -constructs@^10.0.0, constructs@^10.0.25, constructs@^10.3.0: +constructs@10.1.167: + version "10.1.167" + resolved "https://registry.yarnpkg.com/constructs/-/constructs-10.1.167.tgz#7012962af80a53124cc8bf461184149a3e2a944a" + integrity sha512-zGt88EmcJUtWbd/sTM9GKcHRjYWzEx5jzMYuK69vl25Dj01sJAc7uF6AEJgZBtlLAc3VnRUvzgitHwmJkS9BFw== + +constructs@^10.0.0, constructs@^10.3.0: version "10.3.0" resolved "https://registry.yarnpkg.com/constructs/-/constructs-10.3.0.tgz#4c246fce9cf8e77711ad45944e9fbd41f1501965" integrity sha512-vbK8i3rIb/xwZxSpTjz3SagHn1qq9BChLEfy5Hf6fB3/2eFbrwt2n9kHwQcS0CPTRBesreeAcsJfMq2229FnbQ== @@ -1375,6 +1470,11 @@ convert-to-spaces@^1.0.1: resolved "https://registry.yarnpkg.com/convert-to-spaces/-/convert-to-spaces-1.0.2.tgz#7e3e48bbe6d997b1417ddca2868204b4d3d85715" integrity sha512-cj09EBuObp9gZNQCzc7hByQyrs6jVGE+o9kSJmeUoj+GiPiJvi5LYqEH/Hmme4+MTLHM+Ejtq+FChpjjEnsPdQ== +cookie@^0.4.1: + version "0.4.2" + resolved "https://registry.yarnpkg.com/cookie/-/cookie-0.4.2.tgz#0e41f24de5ecf317947c82fc789e06a884824432" + integrity sha512-aSWTXFzaKWkvHO1Ny/s+ePFpvKsPnjc551iI41v3ny/ow6tBG5Vd+FuqGNhh1LxOmVzOlGUriIlOaokOvhaStA== + core-util-is@^1.0.3, core-util-is@~1.0.0: version "1.0.3" resolved "https://registry.yarnpkg.com/core-util-is/-/core-util-is-1.0.3.tgz#a6042d3634c2b27e9328f837b965fac83808db85" @@ -1393,14 +1493,14 @@ crc32-stream@^4.0.2: crc-32 "^1.2.0" readable-stream "^3.4.0" -cross-fetch@^3.1.5: +cross-fetch@3.1.8: version "3.1.8" resolved "https://registry.yarnpkg.com/cross-fetch/-/cross-fetch-3.1.8.tgz#0327eba65fd68a7d119f8fb2bf9334a1a7956f82" integrity sha512-cvA+JwZoU0Xq+h6WkMvAUqPEYy92Obet6UdKLfW60qn99ftItKjB5T+BkyWOFWe2pUyfQ+IJHmpOTznqk1M6Kg== dependencies: node-fetch "^2.6.12" -cross-spawn@^7.0.0, cross-spawn@^7.0.3: +cross-spawn@7.0.3, cross-spawn@^7.0.0, cross-spawn@^7.0.3: version "7.0.3" resolved "https://registry.yarnpkg.com/cross-spawn/-/cross-spawn-7.0.3.tgz#f73a85b9d5d41d045551c177e2882d4ac85728a6" integrity sha512-iRDPJKUPVEND7dHPO8rkbOnPpyDygcDFtWjpeWNCgy8WP2rXcxXL8TskReQl6OrB2G7+UJrags1q15Fudc7G6w== @@ -1456,17 +1556,16 @@ decompress-response@^6.0.0: dependencies: mimic-response "^3.1.0" -deep-equal@^2.2.0: - version "2.2.3" - resolved "https://registry.yarnpkg.com/deep-equal/-/deep-equal-2.2.3.tgz#af89dafb23a396c7da3e862abc0be27cf51d56e1" - integrity sha512-ZIwpnevOurS8bpT4192sqAowWM76JDKSHYzMLty3BZGSswgq6pBaH3DhCSW5xVAZICZyKdOBPjwww5wfgT/6PA== +deep-equal@2.2.0: + version "2.2.0" + resolved "https://registry.yarnpkg.com/deep-equal/-/deep-equal-2.2.0.tgz#5caeace9c781028b9ff459f33b779346637c43e6" + integrity sha512-RdpzE0Hv4lhowpIUKKMJfeH6C1pXdtT1/it80ubgWqwI3qpuxUBpC1S4hnHg+zjnuOoDkzUtUCEEkG+XG5l3Mw== dependencies: - array-buffer-byte-length "^1.0.0" - call-bind "^1.0.5" - es-get-iterator "^1.1.3" - get-intrinsic "^1.2.2" + call-bind "^1.0.2" + es-get-iterator "^1.1.2" + get-intrinsic "^1.1.3" is-arguments "^1.1.1" - is-array-buffer "^3.0.2" + is-array-buffer "^3.0.1" is-date-object "^1.0.5" is-regex "^1.1.4" is-shared-array-buffer "^1.0.2" @@ -1474,18 +1573,18 @@ deep-equal@^2.2.0: object-is "^1.1.5" object-keys "^1.1.1" object.assign "^4.1.4" - regexp.prototype.flags "^1.5.1" + regexp.prototype.flags "^1.4.3" side-channel "^1.0.4" which-boxed-primitive "^1.0.2" which-collection "^1.0.1" - which-typed-array "^1.1.13" + which-typed-array "^1.1.9" deep-extend@^0.6.0: version "0.6.0" resolved "https://registry.yarnpkg.com/deep-extend/-/deep-extend-0.6.0.tgz#c4fa7c95404a17a9c3e8ca7e1537312b736330ac" integrity sha512-LOHxIOaPYdHlJRtCQfDIVZtfw/ufM8+rVj649RIHzcm/vGwQRXFt6OPqIFWsm2XEMrNIEtWR64sY1LEKD2vAOA== -deepmerge@^4.3.1: +deepmerge@4.3.1: version "4.3.1" resolved "https://registry.yarnpkg.com/deepmerge/-/deepmerge-4.3.1.tgz#44b5f2147cd3b00d4b56137685966f26fd25dd4a" integrity sha512-3sUqbMEc77XqpdNO7FRyRog+eW3ph+GYCbj+rK+uYyRMuwsVy0rMiVtPn+QJlKFvWP/1PYpapqYn0Me2knFn+A== @@ -1533,7 +1632,7 @@ detect-newline@^3.1.0: resolved "https://registry.yarnpkg.com/detect-newline/-/detect-newline-3.1.0.tgz#576f5dfc63ae1a192ff192d8ad3af6308991b651" integrity sha512-TLz+x/vEXm/Y7P7wn1EJFNLxYpUD4TgMosxY6fAVJUnJMbupHBOncxyWUG9OpTaH9EBD7uFI5LfEgmMOc54DsA== -detect-port@^1.5.1: +detect-port@1.5.1: version "1.5.1" resolved "https://registry.yarnpkg.com/detect-port/-/detect-port-1.5.1.tgz#451ca9b6eaf20451acb0799b8ab40dff7718727b" integrity sha512-aBzdj76lueB6uUst5iAs7+0H/oOjqI5D16XUWxlWMIMROhcM0rfsNVk93zTngq1dDNpoXRr++Sus7ETAExppAQ== @@ -1607,7 +1706,7 @@ error-ex@^1.3.1: dependencies: is-arrayish "^0.2.1" -es-get-iterator@^1.1.3: +es-get-iterator@^1.1.2: version "1.1.3" resolved "https://registry.yarnpkg.com/es-get-iterator/-/es-get-iterator-1.1.3.tgz#3ef87523c5d464d41084b2c3c9c214f1199763d6" integrity sha512-sPZmqHBe6JIiTfN5q2pEi//TwxmAFHwj/XEuYjTuse78i8KxaqMTTzxPoFKuzRpDpTJ+0NAbpfenkmH2rePtuw== @@ -1652,7 +1751,7 @@ events@^3.3.0: resolved "https://registry.yarnpkg.com/events/-/events-3.3.0.tgz#31a95ad0a924e2d2c419a813aeb2c4e878ea7400" integrity sha512-mQw+2fkQbALzQ7V0MY0IqdnXNOeTtP4r0lN9z7AAawCXgqea7bDii20AYrIBrFd/Hx0M2Ocz6S111CaFkUcb0Q== -execa@^5.1.1: +execa@5.1.1: version "5.1.1" resolved "https://registry.yarnpkg.com/execa/-/execa-5.1.1.tgz#f80ad9cbf4298f7bd1d4c9555c21e93741c411dd" integrity sha512-8uSpZZocAZRBAPIEINJj3Lo9HyGitllczc27Eh5YYojjMFMn8yHMDMaUHE2Jqfq05D/wucwI4JGURyXt1vchyg== @@ -1681,7 +1780,7 @@ external-editor@^3.1.0: iconv-lite "^0.4.24" tmp "^0.0.33" -extract-zip@^2.0.1: +extract-zip@2.0.1: version "2.0.1" resolved "https://registry.yarnpkg.com/extract-zip/-/extract-zip-2.0.1.tgz#663dca56fe46df890d5f131ef4a06d22bb8ba13a" integrity sha512-GDhU9ntwuKyGXdZBUgTIe+vXnWj0fppUEtMDL0+idd5Sta8TGpHssn/eusA9mrPr9qNDym6SxAYZjNvCn/9RBg== @@ -1776,7 +1875,7 @@ flatted@^3.2.7: resolved "https://registry.yarnpkg.com/flatted/-/flatted-3.2.9.tgz#7eb4c67ca1ba34232ca9d2d93e9886e611ad7daf" integrity sha512-36yxDn5H7OFZQla0/jFJmbIKTdZAQHngCedGxiMmpNfEZM0sdEeT+WczLQrjK6D7o2aiyLYDnkw0R3JK0Qv1RQ== -follow-redirects@^1.15.2, follow-redirects@^1.15.3: +follow-redirects@1.15.4: version "1.15.4" resolved "https://registry.yarnpkg.com/follow-redirects/-/follow-redirects-1.15.4.tgz#cdc7d308bf6493126b17ea2191ea0ccf3e535adf" integrity sha512-Cr4D/5wlrb0z9dgERpUL3LrmPKVDsETIJhaCMeDfuFYcqa5bldGV6wBsAN6X/vxlXQtFBMrXdXxdL8CbDTGniw== @@ -1801,16 +1900,7 @@ fs-constants@^1.0.0: resolved "https://registry.yarnpkg.com/fs-constants/-/fs-constants-1.0.0.tgz#6be0de9be998ce16af8afc24497b9ee9b7ccd9ad" integrity sha512-y6OAwoSIf7FyjMIv94u+b5rdheZEjzR63GTyZJm5qh4Bi+2YgwLCcI/fPFZkL5PSixOt6ZNKm+w+Hfp/Bciwow== -fs-extra@^10.1.0: - version "10.1.0" - resolved "https://registry.yarnpkg.com/fs-extra/-/fs-extra-10.1.0.tgz#02873cfbc4084dde127eaa5f9905eef2325d1abf" - integrity sha512-oRXApq54ETRj4eMiFzGnHWGy+zo5raudjuxN0b8H7s/RU2oW0Wvsx9O0ACRN/kRq9E8Vu/ReskGB5o3ji+FzHQ== - dependencies: - graceful-fs "^4.2.0" - jsonfile "^6.0.1" - universalify "^2.0.0" - -fs-extra@^11.1.1: +fs-extra@11.2.0: version "11.2.0" resolved "https://registry.yarnpkg.com/fs-extra/-/fs-extra-11.2.0.tgz#e70e17dfad64232287d01929399e0ea7c86b0e5b" integrity sha512-PmDi3uwK5nFuXh7XDTlVnS17xJS7vW36is2+w3xcv8SVxiB4NyATf4ctkVY5bkSjX0Y4nbvZCq1/EjtEyr9ktw== @@ -1819,7 +1909,7 @@ fs-extra@^11.1.1: jsonfile "^6.0.1" universalify "^2.0.0" -fs-extra@^8.1.0: +fs-extra@8.1.0, fs-extra@^8.1.0: version "8.1.0" resolved "https://registry.yarnpkg.com/fs-extra/-/fs-extra-8.1.0.tgz#49d43c45a88cd9677668cb7be1b46efdb8d2e1c0" integrity sha512-yhlQgA6mnOJUKOsRUFsgJdQCvkKhcz8tlZG5HBQfReYZy46OwLcY+Zia0mtdHsOo9y/hP+CxMN0TU9QxoOtG4g== @@ -1828,6 +1918,15 @@ fs-extra@^8.1.0: jsonfile "^4.0.0" universalify "^0.1.0" +fs-extra@^10.1.0: + version "10.1.0" + resolved "https://registry.yarnpkg.com/fs-extra/-/fs-extra-10.1.0.tgz#02873cfbc4084dde127eaa5f9905eef2325d1abf" + integrity sha512-oRXApq54ETRj4eMiFzGnHWGy+zo5raudjuxN0b8H7s/RU2oW0Wvsx9O0ACRN/kRq9E8Vu/ReskGB5o3ji+FzHQ== + dependencies: + graceful-fs "^4.2.0" + jsonfile "^6.0.1" + universalify "^2.0.0" + fs-extra@^9.1.0: version "9.1.0" resolved "https://registry.yarnpkg.com/fs-extra/-/fs-extra-9.1.0.tgz#5954460c764a8da2094ba3554bf839e6b9a7c86d" @@ -1948,7 +2047,7 @@ glob-promise@^6.0.5: dependencies: "@types/glob" "^8.0.0" -glob@^10.3.3: +glob@10.3.10: version "10.3.10" resolved "https://registry.yarnpkg.com/glob/-/glob-10.3.10.tgz#0351ebb809fd187fe421ab96af83d3a70715df4b" integrity sha512-fa46+tv1Ak0UPK1TOy/pZrIybNNt4HCv7SDzwyfiOZkvZLEbjsZkJBPtDHVshZjbecAoAGSC20MjLDG/qr679g== @@ -1959,6 +2058,17 @@ glob@^10.3.3: minipass "^5.0.0 || ^6.0.2 || ^7.0.0" path-scurry "^1.10.1" +glob@10.3.3: + version "10.3.3" + resolved "https://registry.yarnpkg.com/glob/-/glob-10.3.3.tgz#8360a4ffdd6ed90df84aa8d52f21f452e86a123b" + integrity sha512-92vPiMb/iqpmEgsOoIDvTjc50wf9CCCvMzsi6W0JLPeUKE8TWP1a73PgqSrqy7iAZxaSD1YdzU7QZR5LF51MJw== + dependencies: + foreground-child "^3.1.0" + jackspeak "^2.0.3" + minimatch "^9.0.1" + minipass "^5.0.0 || ^6.0.2 || ^7.0.0" + path-scurry "^1.10.1" + glob@^7.0.0, glob@^7.1.4, glob@^7.2.3: version "7.2.3" resolved "https://registry.yarnpkg.com/glob/-/glob-7.2.3.tgz#b8df0fb802bbfa8e89bd1d938b4e16578ed44f2b" @@ -1994,15 +2104,15 @@ graceful-fs@^4.1.2, graceful-fs@^4.1.6, graceful-fs@^4.2.0: resolved "https://registry.yarnpkg.com/graceful-fs/-/graceful-fs-4.2.11.tgz#4183e4e8bf08bb6e05bbb2f7d2e0c8f712ca40e3" integrity sha512-RbJ5/jmFcNNCcDV5o9eTnBLJ/HszWV0P73bc+Ff4nS/rJj+YaS6IGyiOL0VoBYX+l1Wrl3k63h/KrH+nhJ0XvQ== -graphology-types@^0.24.7: +graphology-types@0.24.7: version "0.24.7" resolved "https://registry.yarnpkg.com/graphology-types/-/graphology-types-0.24.7.tgz#7d630a800061666bfa70066310f56612e08b7bee" integrity sha512-tdcqOOpwArNjEr0gNQKCXwaNCWnQJrog14nJNQPeemcLnXQUUGrsCWpWkVKt46zLjcS6/KGoayeJfHHyPDlvwA== -graphology@^0.25.1: - version "0.25.4" - resolved "https://registry.yarnpkg.com/graphology/-/graphology-0.25.4.tgz#e528a64555ac1f392a9d965321ada5b2b843efe1" - integrity sha512-33g0Ol9nkWdD6ulw687viS8YJQBxqG5LWII6FI6nul0pq6iM2t5EKquOTFDbyTblRB3O9I+7KX4xI8u5ffekAQ== +graphology@0.25.1: + version "0.25.1" + resolved "https://registry.yarnpkg.com/graphology/-/graphology-0.25.1.tgz#f92b86294782522d3898ce4480e4a577c0c2568a" + integrity sha512-yYA7BJCcXN2DrKNQQ9Qf22zBHm/yTbyBR71T1MYBbGtywNHsv0QZtk8zaR6zxNcp2hCCZayUkHp9DyMSZCpoxQ== dependencies: events "^3.3.0" obliterator "^2.0.2" @@ -2095,7 +2205,7 @@ hosted-git-info@^4.0.0, hosted-git-info@^4.0.1: dependencies: lru-cache "^6.0.0" -https-proxy-agent@^5.0.0, https-proxy-agent@^5.0.1: +https-proxy-agent@5.0.1, https-proxy-agent@^5.0.0: version "5.0.1" resolved "https://registry.yarnpkg.com/https-proxy-agent/-/https-proxy-agent-5.0.1.tgz#c59ef224a04fe8b754f3db0063a25ea30d0005d6" integrity sha512-dFcAjpTQFgoLMzC2VwU+C/CbS7uRL0lWmxDITmqm7C+7F0Odmj6s9l6alZc6AELXhrnggM2CeWSXHGOdX2YtwA== @@ -2120,7 +2230,7 @@ ieee754@^1.1.13: resolved "https://registry.yarnpkg.com/ieee754/-/ieee754-1.2.1.tgz#8eb7a10a63fff25d15a57b001586d177d1b0d352" integrity sha512-dcyqhDvX1C46lXZcVqCpK+FtMRQVdIMN6/Df5js2zouUsqG7I6sFxitIC+7KYK29KdXOLHdu9zL4sFnoVQnqaA== -indent-string@^4.0.0: +indent-string@4.0.0, indent-string@^4.0.0: version "4.0.0" resolved "https://registry.yarnpkg.com/indent-string/-/indent-string-4.0.0.tgz#624f8f4497d619b2d9768531d58f4122854d7251" integrity sha512-EdDDZu4A2OyIK7Lr/2zG+w5jmbuk1DVBnEwREQvBzspBJkCEbRa8GxU1lghYcaGJCnRWibjDXlq779X1/y5xwg== @@ -2148,7 +2258,16 @@ ini@^2.0.0: resolved "https://registry.yarnpkg.com/ini/-/ini-2.0.0.tgz#e5fd556ecdd5726be978fa1001862eacb0a94bc5" integrity sha512-7PnF4oN3CvZF23ADhA5wRaYEQpJ8qygSkbtTXWBeXWXmEVRXK+1ITciHWwHhsjv1TmW0MgacIv6hEi5pX5NQdA== -ink-select-input@^4.2.1: +ink-select-input@4.2.1: + version "4.2.1" + resolved "https://registry.yarnpkg.com/ink-select-input/-/ink-select-input-4.2.1.tgz#121108ccbcb42aa619f9f0baedb796c24c971a2a" + integrity sha512-WvlrYdwmdnD6/nE/9mNhaaanTQOKmwy/hT/vuAqbDec3PUQBQ8Pkwszii/8eGvDTx5bGiUHu18P9D5IoB/ERaw== + dependencies: + arr-rotate "^1.0.0" + figures "^3.2.0" + lodash.isequal "^4.5.0" + +ink-select-input@4.2.2: version "4.2.2" resolved "https://registry.yarnpkg.com/ink-select-input/-/ink-select-input-4.2.2.tgz#484672a648b6b214052de721f02a645500cb75d3" integrity sha512-E5AS2Vnd4CSzEa7Rm+hG47wxRQo1ASfh4msKxO7FHmn/ym+GKSSsFIfR+FonqjKNDPXYJClw8lM47RdN3Pi+nw== @@ -2157,31 +2276,31 @@ ink-select-input@^4.2.1: figures "^3.2.0" lodash.isequal "^4.5.0" -ink-spinner@^4.0.3: +ink-spinner@4.0.3: version "4.0.3" resolved "https://registry.yarnpkg.com/ink-spinner/-/ink-spinner-4.0.3.tgz#0d0f4a787ae1a4270928e063d9c52527cb264feb" integrity sha512-uJ4nbH00MM9fjTJ5xdw0zzvtXMkeGb0WV6dzSWvFv2/+ks6FIhpkt+Ge/eLdh0Ah6Vjw5pLMyNfoHQpRDRVFbQ== dependencies: cli-spinners "^2.3.0" -ink-table@^3.0.0: - version "3.1.0" - resolved "https://registry.yarnpkg.com/ink-table/-/ink-table-3.1.0.tgz#d450624e344702b5cb7cadcb25783c58555c7c54" - integrity sha512-qxVb4DIaEaJryvF9uZGydnmP9Hkmas3DCKVpEcBYC0E4eJd3qNgNe+PZKuzgCERFe9LfAS1TNWxCr9+AU4v3YA== +ink-table@3.0.0: + version "3.0.0" + resolved "https://registry.yarnpkg.com/ink-table/-/ink-table-3.0.0.tgz#109fb2ce0709567f0e38d14b2b82f311277a3628" + integrity sha512-RtcYjenHKZWjnwVNQ6zSYWMOLKwkWscDAJsqUQXftyjkYho1gGrluGss87NOoIzss0IKr74lKasd6MtlQYALiA== dependencies: object-hash "^2.0.3" -ink-testing-library@^2.1.0: +ink-testing-library@2.1.0: version "2.1.0" resolved "https://registry.yarnpkg.com/ink-testing-library/-/ink-testing-library-2.1.0.tgz#b5ffd1ef1049550ae4d2f008b8770e7ece6e0313" integrity sha512-7TNlOjJlJXB33vG7yVa+MMO7hCjaC1bCn+zdpSjknWoLbOWMaFdKc7LJvqVkZ0rZv2+akhjXPrcR/dbxissjUw== -ink-use-stdout-dimensions@^1.0.5: +ink-use-stdout-dimensions@1.0.5: version "1.0.5" resolved "https://registry.yarnpkg.com/ink-use-stdout-dimensions/-/ink-use-stdout-dimensions-1.0.5.tgz#7739876c00284840601c4150aa84eb7adc143de2" integrity sha512-rVsqnw4tQEAJUoknU09+zHdDf30GJdkumkHr0iz/TOYMYEZJkYqziQSGJAM+Z+M603EDfO89+Nxyn/Ko2Zknfw== -ink@^3.2.0: +ink@3.2.0: version "3.2.0" resolved "https://registry.yarnpkg.com/ink/-/ink-3.2.0.tgz#434793630dc57d611c8fe8fffa1db6b56f1a16bb" integrity sha512-firNp1q3xxTzoItj/eOOSZQnYSlyrWks5llCTVX37nJ59K3eXbQ8PtzCguqo8YI19EELo5QxaKnJd4VxzhU8tg== @@ -2232,7 +2351,7 @@ is-arguments@^1.1.1: call-bind "^1.0.2" has-tostringtag "^1.0.0" -is-array-buffer@^3.0.1, is-array-buffer@^3.0.2: +is-array-buffer@^3.0.1: version "3.0.2" resolved "https://registry.yarnpkg.com/is-array-buffer/-/is-array-buffer-3.0.2.tgz#f2653ced8412081638ecb0ebbd0c41c6e0aecbbe" integrity sha512-y+FyyR/w8vfIRq4eQcM1EYgSTnmHXPqaF+IgzgraytCFq5Xh8lllDVmAZolPJiZttZLeFSINPYMaEJ7/vWUa1w== @@ -2396,7 +2515,7 @@ is-typed-array@^1.1.10: dependencies: which-typed-array "^1.1.11" -is-valid-domain@^0.1.6: +is-valid-domain@0.1.6: version "0.1.6" resolved "https://registry.yarnpkg.com/is-valid-domain/-/is-valid-domain-0.1.6.tgz#3c85469d2938f170c8f82ce6e52df8ad9fca8105" integrity sha512-ZKtq737eFkZr71At8NxOFcP9O1K89gW3DkdrGMpp1upr/ueWjj+Weh4l9AI4rN0Gt8W2M1w7jrG2b/Yv83Ljpg== @@ -2438,7 +2557,7 @@ isexe@^2.0.0: resolved "https://registry.yarnpkg.com/isexe/-/isexe-2.0.0.tgz#e8fbf374dc556ff8947a10dcb0572d633f2cfa10" integrity sha512-RHxMLp9lnKHGHRng9QFhRCMbYAcVpn69smSGcq3f36xjgVVWThj4qqLbTLlq7Ssj8B+fIQ1EuCEGI2lKsyQeIw== -jackspeak@^2.3.5: +jackspeak@^2.0.3, jackspeak@^2.3.5: version "2.3.6" resolved "https://registry.yarnpkg.com/jackspeak/-/jackspeak-2.3.6.tgz#647ecc472238aee4b06ac0e461acc21a8c505ca8" integrity sha512-N3yCS/NegsOBokc8GAdM8UcmfsKiSS8cipheD/nivzr700H+nsMOxJjQnvwOcRYVuFkdH0wGUvW2WbXGmrZGbQ== @@ -2491,7 +2610,7 @@ jsii-docgen@^10.2.3: semver "^7.5.4" yargs "^16.2.0" -jsii-pacmak@^1.87.0, jsii-pacmak@^1.93.0: +jsii-pacmak@1.93.0, jsii-pacmak@^1.93.0: version "1.93.0" resolved "https://registry.yarnpkg.com/jsii-pacmak/-/jsii-pacmak-1.93.0.tgz#5793c251cb45963d57bc839cf8bbe64d8e5b998f" integrity sha512-A2rn4seHN+1/VzwQ0H8t6zxAz9HpZWbF+kVi9MpNgqd2iiNYxS1XNyirzyQ8D3e5ZNWoPAyFVuGqkXrtdo4etg== @@ -2522,25 +2641,7 @@ jsii-reflect@^1.93.0: oo-ascii-tree "^1.93.0" yargs "^16.2.0" -jsii-rosetta@^1.93.0: - version "1.93.0" - resolved "https://registry.yarnpkg.com/jsii-rosetta/-/jsii-rosetta-1.93.0.tgz#951e8ae27ceaf0504abd74c15866f6050c97ef82" - integrity sha512-5HFoC6Cp3Y3usCGuTRDTL/ovgz9MxI6/kY4Re8agVShXR6MPSX6F6Sc1qGMUjf3ynFfPz+DMsBY0Z164cxVKBA== - dependencies: - "@jsii/check-node" "1.93.0" - "@jsii/spec" "1.93.0" - "@xmldom/xmldom" "^0.8.10" - commonmark "^0.30.0" - fast-glob "^3.3.2" - jsii "1.93.0" - semver "^7.5.4" - semver-intersect "^1.4.0" - stream-json "^1.8.0" - typescript "~3.9.10" - workerpool "^6.5.1" - yargs "^16.2.0" - -jsii-rosetta@^5.1.9: +jsii-rosetta@5.3.2: version "5.3.2" resolved "https://registry.yarnpkg.com/jsii-rosetta/-/jsii-rosetta-5.3.2.tgz#2683f16cfd035277dc9843e9087556827938ce56" integrity sha512-pY5wm72XcT9RdTWh/UpIVnyLScz381GtmlW4ey9ojJdHUoxvtni0vdGdSl+ZaojqEQR7TLdUM+ocLgB8Xnujxw== @@ -2559,6 +2660,24 @@ jsii-rosetta@^5.1.9: workerpool "^6.5.1" yargs "^17.7.2" +jsii-rosetta@^1.93.0: + version "1.93.0" + resolved "https://registry.yarnpkg.com/jsii-rosetta/-/jsii-rosetta-1.93.0.tgz#951e8ae27ceaf0504abd74c15866f6050c97ef82" + integrity sha512-5HFoC6Cp3Y3usCGuTRDTL/ovgz9MxI6/kY4Re8agVShXR6MPSX6F6Sc1qGMUjf3ynFfPz+DMsBY0Z164cxVKBA== + dependencies: + "@jsii/check-node" "1.93.0" + "@jsii/spec" "1.93.0" + "@xmldom/xmldom" "^0.8.10" + commonmark "^0.30.0" + fast-glob "^3.3.2" + jsii "1.93.0" + semver "^7.5.4" + semver-intersect "^1.4.0" + stream-json "^1.8.0" + typescript "~3.9.10" + workerpool "^6.5.1" + yargs "^16.2.0" + jsii-rosetta@~5.2.0: version "5.2.6" resolved "https://registry.yarnpkg.com/jsii-rosetta/-/jsii-rosetta-5.2.6.tgz#a5c6d37cff1992f7089f0766c22aea3e33c1c46c" @@ -2578,7 +2697,7 @@ jsii-rosetta@~5.2.0: workerpool "^6.5.1" yargs "^17.7.2" -jsii-srcmak@^0.1.951, jsii-srcmak@^0.1.954: +jsii-srcmak@0.1.999: version "0.1.999" resolved "https://registry.yarnpkg.com/jsii-srcmak/-/jsii-srcmak-0.1.999.tgz#8cbfd975e87749153878bf21e29076547d83b37c" integrity sha512-8jhGRjceKdvYlW3rujnrZWTa1bss7TUhcsVrRsT7Q+MDYxRZan0FsqyHKrjfb8GYpgSh5DVpc9iYCwmn6VgXsw== @@ -2608,7 +2727,7 @@ jsii@1.93.0: typescript "~3.9.10" yargs "^16.2.0" -jsii@^5.1.10, jsii@~5.3.0: +jsii@5.3.2, jsii@~5.3.0: version "5.3.2" resolved "https://registry.yarnpkg.com/jsii/-/jsii-5.3.2.tgz#3dc65c39dea3fb4e2f77fd7b48be5d3fef585962" integrity sha512-wwwp47+6orlMXpny4dlTOP6776cBo2WFDgxZyGjQaV4VWNydsJiTcinuJzCj1XVZicBhpAnkuBMr89+2aT8Dcg== @@ -2627,6 +2746,25 @@ jsii@^5.1.10, jsii@~5.3.0: typescript "~5.3" yargs "^17.7.2" +jsii@5.3.3: + version "5.3.3" + resolved "https://registry.yarnpkg.com/jsii/-/jsii-5.3.3.tgz#49e12615543c9e0a6cbd2ed82dae347eb993c10c" + integrity sha512-M+kAUKJiLXXJXKYmBB0Q2n1aGoeNHyzMCLAx7402JqXSLxH4JGh6kOf4EH3U3LmQKzv2kxOHMRCg3Ssh82KtrQ== + dependencies: + "@jsii/check-node" "1.93.0" + "@jsii/spec" "^1.93.0" + case "^1.6.3" + chalk "^4" + downlevel-dts "^0.11.0" + fast-deep-equal "^3.1.3" + log4js "^6.9.1" + semver "^7.5.4" + semver-intersect "^1.5.0" + sort-json "^2.0.1" + spdx-license-list "^6.8.0" + typescript "~5.3" + yargs "^17.7.2" + jsii@~5.2.0: version "5.2.35" resolved "https://registry.yarnpkg.com/jsii/-/jsii-5.2.35.tgz#d56a9cb8f01f709250df28b61b365c5978652538" @@ -2680,7 +2818,7 @@ json-schema-traverse@^1.0.0: resolved "https://registry.yarnpkg.com/json-schema-traverse/-/json-schema-traverse-1.0.0.tgz#ae7bcb3656ab77a73ba5c49bf654f38e6b6860e2" integrity sha512-NM8/P9n3XjXhIZn1lLhkFaACTOURQXjWhV4BA/RnOv8xvgqtqpAX9IO4mRQxSx1Rlo4tqzeqb0sOlruaOy3dug== -json-stable-stringify@^1.0.2: +json-stable-stringify@1.1.0: version "1.1.0" resolved "https://registry.yarnpkg.com/json-stable-stringify/-/json-stable-stringify-1.1.0.tgz#43d39c7c8da34bfaf785a61a56808b0def9f747d" integrity sha512-zfA+5SuwYN2VWqN1/5HZaDzQKLJHaBVMZIIM+wuYjdptkaQsqzDdqjqf+lZZJUuJq1aanHiY8LhH8LmH+qBYJA== @@ -2793,7 +2931,7 @@ lodash.flatten@^4.4.0: resolved "https://registry.yarnpkg.com/lodash.flatten/-/lodash.flatten-4.4.0.tgz#f31c22225a9632d2bbf8e4addbef240aa765a61f" integrity sha512-C5N2Z3DgnnKr0LOpv/hKCgKdb7ZZwafIrsesve6lmzvZIRZRGaZ/l6Q8+2W7NaT+ZwO3fFlSCzCzrDCFdJfZ4g== -lodash.isequal@^4.5.0: +lodash.isequal@4.5.0, lodash.isequal@^4.5.0: version "4.5.0" resolved "https://registry.yarnpkg.com/lodash.isequal/-/lodash.isequal-4.5.0.tgz#415c4478f2bcc30120c22ce10ed3226f7d3e18e0" integrity sha512-pDo3lu8Jhfjqls6GkMgpahsF9kCyayhgykjyLMNFTKWrpVdAQtYyB4muAMWozBB4ig/dtWAmsMxLEI8wuz+DYQ== @@ -2818,7 +2956,7 @@ lodash@^4.17.15, lodash@^4.17.20: resolved "https://registry.yarnpkg.com/lodash/-/lodash-4.17.21.tgz#679591c564c3bffaae8454cf0b3df370c3d6911c" integrity sha512-v2kDEe57lecTulaDIuNTPy3Ry4gLGJ6Z1O3vE1krgXZNrsQ+LFTGHVxVjcXPs17LhbZVGedAJv8XZ1tvj5FvSg== -log4js@^6.7.0, log4js@^6.9.1: +log4js@6.9.1, log4js@^6.9.1: version "6.9.1" resolved "https://registry.yarnpkg.com/log4js/-/log4js-6.9.1.tgz#aba5a3ff4e7872ae34f8b4c533706753709e38b6" integrity sha512-1somDdy9sChrr9/f4UlzhdaGfDR2c/SaD2a4T7qEkG4jTS57/B3qmnjLYePwQ8cqWnUHZI0iAKxMBpCZICiZ2g== @@ -2855,6 +2993,11 @@ lru-cache@^6.0.0: resolved "https://registry.yarnpkg.com/lru-cache/-/lru-cache-10.1.0.tgz#2098d41c2dc56500e6c88584aa656c84de7d0484" integrity sha512-/1clY/ui8CzjKFyjdvwPWJUYKiFVXG2I2cY0ssG7h4+hwk+XOIX7ZSG9Q7TW8TW3Kp3BUSqgFWBLgL4PJ+Blag== +lru_map@^0.3.3: + version "0.3.3" + resolved "https://registry.yarnpkg.com/lru_map/-/lru_map-0.3.3.tgz#b5c8351b9464cbd750335a79650a0ec0e56118dd" + integrity sha512-Pn9cox5CsMYngeDbmChANltQl+5pi6XmTrraMSzhPmMBbmgcxmqWry0U3PGapCU1yB4/LqCcom7qhHZiF/jGfQ== + map-obj@^1.0.0: version "1.0.1" resolved "https://registry.yarnpkg.com/map-obj/-/map-obj-1.0.1.tgz#d933ceb9205d82bdcf4886f6742bdc2b4dea146d" @@ -2920,20 +3063,27 @@ min-indent@^1.0.0: resolved "https://registry.yarnpkg.com/min-indent/-/min-indent-1.0.1.tgz#a63f681673b30571fbe8bc25686ae746eefa9869" integrity sha512-I9jwMn07Sy/IwOj3zVkVik2JTvgpaykDZEigL6Rx6N9LbMywwUSMtxET+7lVoDLLd3O3IXwJwvuuns8UB/HeAg== -minimatch@^3.0.4, minimatch@^3.1.1: - version "3.1.2" - resolved "https://registry.yarnpkg.com/minimatch/-/minimatch-3.1.2.tgz#19cd194bfd3e428f049a70817c038d89ab4be35b" - integrity sha512-J7p63hRiAjw1NDEww1W7i37+ByIrOWO5XQQAzZ3VOcL0PNybwpfmV/N05zFAzwQ9USyEcX6t3UO+K5aqBQOIHw== +minimatch@5.1.0: + version "5.1.0" + resolved "https://registry.yarnpkg.com/minimatch/-/minimatch-5.1.0.tgz#1717b464f4971b144f6aabe8f2d0b8e4511e09c7" + integrity sha512-9TPBGGak4nHfGZsPBohm9AWg6NoT7QTCehS3BIJABslyZbzxfV78QM2Y6+i741OPZIafFAaiiEMh5OyIrJPgtg== dependencies: - brace-expansion "^1.1.7" + brace-expansion "^2.0.1" -minimatch@^5.0.1, minimatch@^5.1.0: +minimatch@5.1.6, minimatch@^5.0.1, minimatch@^5.1.0: version "5.1.6" resolved "https://registry.yarnpkg.com/minimatch/-/minimatch-5.1.6.tgz#1cfcb8cf5522ea69952cd2af95ae09477f122a96" integrity sha512-lKwV/1brpG6mBUFHtb7NUmtABCb2WZZmm2wNiOA5hAb8VdCS4B3dtMWyvcoViccwAW/COERjXLt0zP1zXUN26g== dependencies: brace-expansion "^2.0.1" +minimatch@^3.0.4, minimatch@^3.1.1: + version "3.1.2" + resolved "https://registry.yarnpkg.com/minimatch/-/minimatch-3.1.2.tgz#19cd194bfd3e428f049a70817c038d89ab4be35b" + integrity sha512-J7p63hRiAjw1NDEww1W7i37+ByIrOWO5XQQAzZ3VOcL0PNybwpfmV/N05zFAzwQ9USyEcX6t3UO+K5aqBQOIHw== + dependencies: + brace-expansion "^1.1.7" + minimatch@^9.0.1: version "9.0.3" resolved "https://registry.yarnpkg.com/minimatch/-/minimatch-9.0.3.tgz#a6e00c3de44c3a542bfaae70abfc22420a6da825" @@ -3015,7 +3165,14 @@ node-abi@^3.3.0: dependencies: semver "^7.3.5" -node-fetch@^2.6.12, node-fetch@^2.6.7: +node-fetch@2.6.7: + version "2.6.7" + resolved "https://registry.yarnpkg.com/node-fetch/-/node-fetch-2.6.7.tgz#24de9fba827e3b4ae44dc8b20256a379160052ad" + integrity sha512-ZjMPFEfVx5j+y2yF35Kzx5sF7kDzxuDj6ziH4FFbOp87zKDZNx8yExJIb05OGF4Nlt9IHFIMBkRl41VdvcNdbQ== + dependencies: + whatwg-url "^5.0.0" + +node-fetch@2.7.0, node-fetch@^2.6.12: version "2.7.0" resolved "https://registry.yarnpkg.com/node-fetch/-/node-fetch-2.7.0.tgz#d0f0fa6e3e2dc1d27efcd8ad99d550bda94d187d" integrity sha512-c4FRfUm/dbcWZ7U+1Wq0AwCyFL+3nt2bEw05wfxSz+DWpWsitgmSgYmy2dQdWyKC1694ELPqMs/YzUSNozLt8A== @@ -3116,7 +3273,7 @@ oo-ascii-tree@^1.93.0: resolved "https://registry.yarnpkg.com/oo-ascii-tree/-/oo-ascii-tree-1.93.0.tgz#fbe47cd5d188353e6d4cc7cad8520ac790bd3ef4" integrity sha512-zbmrGCL/UsvxV2WlnsSrqdkdxEggxH7eA1HOk+hmimLQu+eLO4Y3VGqwt0VK04Nfe6iG6GnzRL5/XjH0j1v8bQ== -open@^7.4.2: +open@7.4.2: version "7.4.2" resolved "https://registry.yarnpkg.com/open/-/open-7.4.2.tgz#b8147e26dcf3e426316c730089fd71edd29c2321" integrity sha512-MVHddDVweXZF3awtlAS+6pgKLlm/JgxZ90+/NBurBoQctVOOB/zDdVjcyPzQ+0laDGbsWgrRkflI65sQeOgT9Q== @@ -3196,7 +3353,7 @@ param-case@^3.0.4: dot-case "^3.0.4" tslib "^2.0.3" -parse-gitignore@^1.0.1: +parse-gitignore@1.0.1: version "1.0.1" resolved "https://registry.yarnpkg.com/parse-gitignore/-/parse-gitignore-1.0.1.tgz#8b9dc57f17b810d495c5dfa62eb07caffe7758c7" integrity sha512-UGyowyjtx26n65kdAMWhm6/3uy5uSrpcuH7tt+QEVudiBoVS+eqHxD5kbi9oWVRwj7sCzXqwuM+rUGw7earl6A== @@ -3290,12 +3447,12 @@ picomatch@^2.0.4, picomatch@^2.2.1, picomatch@^2.3.1: resolved "https://registry.yarnpkg.com/picomatch/-/picomatch-2.3.1.tgz#3ba3833733646d9d3e4995946c1365a67fb07a42" integrity sha512-JU3teHTNjmE2VCGFzuY8EXzCDVwEqB2a8fsIvwaStHhAWJEeVd1o1QD80CU6+ZdEXXSLbSsuLwJjkCBWqRQUVA== -pidtree@^0.6.0: +pidtree@0.6.0: version "0.6.0" resolved "https://registry.yarnpkg.com/pidtree/-/pidtree-0.6.0.tgz#90ad7b6d42d5841e69e0a2419ef38f8883aa057c" integrity sha512-eG2dWTVw5bzqGRztnHExczNxt5VGsE6OwTeCG3fdUf9KBsZzO3R5OIIIzWR+iZA0NtZ+RDVdaoE2dK1cn6jH4g== -pidusage@^3.0.2: +pidusage@3.0.2: version "3.0.2" resolved "https://registry.yarnpkg.com/pidusage/-/pidusage-3.0.2.tgz#6faa5402b2530b3af2cf93d13bcf202889724a53" integrity sha512-g0VU+y08pKw5M8EZ2rIGiEBaB8wrQMjYGFfW2QVIfyT8V+fq8YFLkvlz4bz5ljvFDJYNFCWT3PWqcRr2FKO81w== @@ -3312,7 +3469,7 @@ pify@^3.0.0: resolved "https://registry.yarnpkg.com/pify/-/pify-3.0.0.tgz#e5a4acd2c101fdf3d9a4d07f0dbc4db49dd28176" integrity sha512-C3FsVNH1udSEX48gGX1xfvwTWfsYWj5U+8/uK15BGzIGrKoUpghX8hWZwa/OFnakBiiVNmBvemTJR5mcy7iPcg== -pkg-up@^3.1.0: +pkg-up@3.1.0: version "3.1.0" resolved "https://registry.yarnpkg.com/pkg-up/-/pkg-up-3.1.0.tgz#100ec235cc150e4fd42519412596a28512a0def5" integrity sha512-nDywThFk1i4BQK4twPQ6TA4RT8bDY96yeuCVBWL3ePARCiEKDRSrNGbFIgUJpLp+XeIR65v8ra7WuJOFUBtkMA== @@ -3337,20 +3494,20 @@ prebuild-install@^7.1.1: tar-fs "^2.0.0" tunnel-agent "^0.6.0" -prettier@^2.8.6: - version "2.8.8" - resolved "https://registry.yarnpkg.com/prettier/-/prettier-2.8.8.tgz#e8c5d7e98a4305ffe3de2e1fc4aca1a71c28b1da" - integrity sha512-tdN8qQGvNjw4CHbY+XXk0JgCXn9QiF21a55rBe5LJAU+kDyC4WQn4+awm2Xfk2lQMk5fKup9XgzTZtGkjBdP9Q== +prettier@2.8.7: + version "2.8.7" + resolved "https://registry.yarnpkg.com/prettier/-/prettier-2.8.7.tgz#bb79fc8729308549d28fe3a98fce73d2c0656450" + integrity sha512-yPngTo3aXUUmyuTjeTUT75txrf+aMh9FiD7q9ZE/i6r0bPb22g4FsE6Y338PQX1bmfy08i9QQCB7/rcUAVntfw== process-nextick-args@~2.0.0: version "2.0.1" resolved "https://registry.yarnpkg.com/process-nextick-args/-/process-nextick-args-2.0.1.tgz#7820d9b16120cc55ca9ae7792680ae7dba6d7fe2" integrity sha512-3ouUOpQhtgrbOa17J7+uxOTpITYWaGP7/AhoR3+A+/1e9skrzelGi/dXzEYyvbxubEF6Wn2ypscTKiKJFFn1ag== -projen@^0.78.11: - version "0.78.11" - resolved "https://registry.yarnpkg.com/projen/-/projen-0.78.11.tgz#e54566f72e9d18fdc4002d2704555fdb100b84d4" - integrity sha512-SfAMFJcXNWwFbt/HYS/bnYiBQK2nS33bp0tWV3j3Eb6mTiiwyEAjMF5l1rp9Fi+zZ1rV6ai2el2kaVQmcl3K3A== +projen@^0.78.13: + version "0.78.13" + resolved "https://registry.yarnpkg.com/projen/-/projen-0.78.13.tgz#5c6693ababa4f2e7d93759c722a35d41c9c2e691" + integrity sha512-ihL1lcfmi7M0EA7qgdXGja2SLLc6vtsQ1Wd2RqqxOuFnchw9/kZubdrxy38J8iI36AEwb0Qucb1uLTuwFhl7Qw== dependencies: "@iarna/toml" "^2.2.5" case "^1.6.3" @@ -3509,7 +3666,7 @@ redent@^3.0.0: indent-string "^4.0.0" strip-indent "^3.0.0" -regexp.prototype.flags@^1.5.1: +regexp.prototype.flags@^1.4.3: version "1.5.1" resolved "https://registry.yarnpkg.com/regexp.prototype.flags/-/regexp.prototype.flags-1.5.1.tgz#90ce989138db209f81492edd734183ce99f9677e" integrity sha512-sy6TXMN+hnP/wMy+ISxg3krXx7BAtWVO4UouuCN/ziM9UEne0euamVNafDfvC83bRNr95y0V5iijeDQFUNpvrg== @@ -3538,7 +3695,7 @@ require-main-filename@^2.0.0: resolved "https://registry.yarnpkg.com/require-main-filename/-/require-main-filename-2.0.0.tgz#d0b329ecc7cc0f61649f62215be69af54aa8989b" integrity sha512-NKN5kMDylKuldxYLSUfrbo5Tuzh4hd+2E8NPPX02mZtn1VuREQToYe/ZdlJy+J3uCpfaiGF05e7B8W0iXbQHmg== -reserved-words@^0.1.2: +reserved-words@0.1.2: version "0.1.2" resolved "https://registry.yarnpkg.com/reserved-words/-/reserved-words-0.1.2.tgz#00a0940f98cd501aeaaac316411d9adc52b31ab1" integrity sha512-0S5SrIUJ9LfpbVl4Yzij6VipUdafHrOTzvmfazSw/jeZrZtQK303OPZW+obtkaw7jQlTQppy0UvZWm9872PbRw== @@ -3622,18 +3779,18 @@ semver-intersect@^1.4.0, semver-intersect@^1.5.0: resolved "https://registry.yarnpkg.com/semver/-/semver-5.7.2.tgz#48d55db737c3287cd4835e17fa13feace1c41ef8" integrity sha512-cBznnQ9KjJqU67B52RMC65CMarK2600WFnbkcaiwWq3xy/5haFJlshgnpjovMVJ+Hff49d8GEn0b87C5pDQ10g== -semver@^6.0.0, semver@^6.3.0: - version "6.3.1" - resolved "https://registry.yarnpkg.com/semver/-/semver-6.3.1.tgz#556d2ef8689146e46dcea4bfdd095f3434dffcb4" - integrity sha512-BR7VvDCVHO+q2xBEWskxS6DJE1qRnb7DxzUrogb71CWoSficBxYsiAGd+Kl0mmq/MprG9yArRkyrQxTO6XjMzA== - -semver@^7.1.1, semver@^7.3.2, semver@^7.3.4, semver@^7.3.5, semver@^7.5.3, semver@^7.5.4: +semver@7.5.4, semver@^7.1.1, semver@^7.3.2, semver@^7.3.4, semver@^7.3.5, semver@^7.5.3, semver@^7.5.4: version "7.5.4" resolved "https://registry.yarnpkg.com/semver/-/semver-7.5.4.tgz#483986ec4ed38e1c6c48c34894a9182dbff68a6e" integrity sha512-1bCSESV6Pv+i21Hvpxp3Dx+pSD8lIPt8uVjRrxAUt/nbswYc+tK6Y2btiULjd4+fnq15PX+nqQDC7Oft7WkwcA== dependencies: lru-cache "^6.0.0" +semver@^6.0.0, semver@^6.3.0: + version "6.3.1" + resolved "https://registry.yarnpkg.com/semver/-/semver-6.3.1.tgz#556d2ef8689146e46dcea4bfdd095f3434dffcb4" + integrity sha512-BR7VvDCVHO+q2xBEWskxS6DJE1qRnb7DxzUrogb71CWoSficBxYsiAGd+Kl0mmq/MprG9yArRkyrQxTO6XjMzA== + sentence-case@^3.0.4: version "3.0.4" resolved "https://registry.yarnpkg.com/sentence-case/-/sentence-case-3.0.4.tgz#3645a7b8c117c787fde8702056225bb62a45131f" @@ -3815,7 +3972,7 @@ sprintf-js@~1.0.2: resolved "https://registry.yarnpkg.com/sprintf-js/-/sprintf-js-1.0.3.tgz#04e6926f662895354f3dd015203633b857297e2c" integrity sha512-D9cPgkvLlV3t3IzL0D0YLvGA9Ahk4PcvVwUbN0dSGr1aP0Nrt4AEnTUbuGvquEC0mA64Gqt1fzirlRs5ibXx8g== -sscaff@^1.2.274: +sscaff@1.2.274: version "1.2.274" resolved "https://registry.yarnpkg.com/sscaff/-/sscaff-1.2.274.tgz#3ae52042fbeb244b01b89542a56ce5b247284be9" integrity sha512-sztRa50SL1LVxZnF1au6QT1SC2z0S1oEOyi2Kpnlg6urDns93aL32YxiJcNkLcY+VHFtVqm/SRv4cb+6LeoBQA== @@ -3854,7 +4011,7 @@ stop-iteration-iterator@^1.0.0: dependencies: internal-slot "^1.0.4" -stream-buffers@^3.0.2: +stream-buffers@3.0.2: version "3.0.2" resolved "https://registry.yarnpkg.com/stream-buffers/-/stream-buffers-3.0.2.tgz#5249005a8d5c2d00b3a32e6e0a6ea209dc4f3521" integrity sha512-DQi1h8VEBA/lURbSwFtEHnSTb9s2/pwLEaFuNhXwy1Dx3Sa0lOuYT2yNUr4/j2fs8oCAMANtrZ5OrPZtyVs3MQ== @@ -3922,7 +4079,7 @@ stringify-package@^1.0.1: resolved "https://registry.yarnpkg.com/stringify-package/-/stringify-package-1.0.1.tgz#e5aa3643e7f74d0f28628b72f3dad5cecfc3ba85" integrity sha512-sa4DUQsYciMP1xhKWGuFM04fB0LG/9DlluZoSVywUMRNvzid6XucHK0/90xGxRoHrAaROrcHK1aPKaijCtSrhg== -"strip-ansi-cjs@npm:strip-ansi@^6.0.1", strip-ansi@^6.0.0, strip-ansi@^6.0.1: +"strip-ansi-cjs@npm:strip-ansi@^6.0.1", strip-ansi@6.0.1, strip-ansi@^6.0.0, strip-ansi@^6.0.1: version "6.0.1" resolved "https://registry.yarnpkg.com/strip-ansi/-/strip-ansi-6.0.1.tgz#9e26c63d30f53443e9489495b2105d37b67a85d9" integrity sha512-Y38VPSHcqkFrCpFnQ9vuSXmquuv5oXOKpGeT6aGrr3o3Gc9AlVa6JBfUSOCnbxGGZF+/0ooI7KrPuUSztUdU5A== @@ -4052,12 +4209,12 @@ trim-newlines@^3.0.0: resolved "https://registry.yarnpkg.com/trim-newlines/-/trim-newlines-3.0.1.tgz#260a5d962d8b752425b32f3a7db0dcacd176c144" integrity sha512-c1PTsA3tYrIsLGkJkzHF+w9F2EyxfXGo4UyJc4pFL++FMjnq0HJS69T3M7d//gKrFKwy429bouPescbjecU+Zw== -tslib@^2.0.3: +tslib@^2.0.3, "tslib@^2.4.1 || ^1.9.3": version "2.6.2" resolved "https://registry.yarnpkg.com/tslib/-/tslib-2.6.2.tgz#703ac29425e7b37cd6fd456e92404d46d1f3e4ae" integrity sha512-AEYxH93jGFPn/a2iVAwW87VuUIkR1FVUKB77NwMF7nBTDkDrrT/Hpt/IrCJ0QXhW27jTBDcf5ZY7w6RiqTMw2Q== -tunnel-agent@^0.6.0: +tunnel-agent@0.6.0, tunnel-agent@^0.6.0: version "0.6.0" resolved "https://registry.yarnpkg.com/tunnel-agent/-/tunnel-agent-0.6.0.tgz#27a5dea06b36b04a0a9966774b290868f0fc40fd" integrity sha512-McnNiV1l8RYeY8tBgEpuodCC1mLUdbSN+CYBL7kJsJNInOP8UjDDEwdk6Mw60vdLLrr5NHKZhMAOSrR2NZuQ+w== @@ -4172,12 +4329,12 @@ util-deprecate@^1.0.1, util-deprecate@~1.0.1: resolved "https://registry.yarnpkg.com/util-deprecate/-/util-deprecate-1.0.2.tgz#450d4dc9fa70de732762fbd2d4a28981419a0ccf" integrity sha512-EPD5q1uXyFxJpCrLnCc1nHnq3gOa6DZBocAIiI2TaSCA7VCJ1UJDMagCzIkXNsUYfD1daK//LTEQ8xiIbrHtcw== -uuid@^8.3.2: +uuid@8.3.2, uuid@^8.3.2: version "8.3.2" resolved "https://registry.yarnpkg.com/uuid/-/uuid-8.3.2.tgz#80d5b5ced271bb9af6c445f21a1a04c606cefbe2" integrity sha512-+NYs2QeMWy+GWFOEm9xnn6HCDp0l7QBD7ml8zLUmJ+93Q5NF0NocErnwkTkXVFNiX3/fpC6afS8Dhb/gz7R7eg== -uuid@^9.0.1: +uuid@9.0.1: version "9.0.1" resolved "https://registry.yarnpkg.com/uuid/-/uuid-9.0.1.tgz#e188d4c8853cc722220392c424cd637f32293f30" integrity sha512-b+1eJOlsR9K8HJpow9Ok3fiWOWSIcIzXodvv0rQjVoOVNpWMpxf1wZNpt4y9h10odCNrqnYp1OBzRktckBe3sA== @@ -4229,7 +4386,7 @@ which-module@^2.0.0: resolved "https://registry.yarnpkg.com/which-module/-/which-module-2.0.1.tgz#776b1fe35d90aebe99e8ac15eb24093389a4a409" integrity sha512-iBdZ57RDvnOR9AGBhML2vFZf7h8vmBjhoaZqODJBFWHVtKkDmKuHai3cx5PgVMrX5YDNp27AofYbAwctSS+vhQ== -which-typed-array@^1.1.11, which-typed-array@^1.1.13: +which-typed-array@^1.1.11, which-typed-array@^1.1.9: version "1.1.13" resolved "https://registry.yarnpkg.com/which-typed-array/-/which-typed-array-1.1.13.tgz#870cd5be06ddb616f504e7b039c4c24898184d36" integrity sha512-P5Nra0qjSncduVPEAr7xhoF5guty49ArDTwzJ/yNuPIbZppyRxFQsRCWrocxIY+CnMVG+qfbU2FmDKyvSGClow== @@ -4301,7 +4458,7 @@ ws@^7, ws@^7.5.5: resolved "https://registry.yarnpkg.com/ws/-/ws-7.5.9.tgz#54fa7db29f4c7cec68b1ddd3a89de099942bb591" integrity sha512-F+P9Jil7UiSKSkppIiD94dN07AwvFixvLIj1Og1Rl9GGMuNipJnV9JzjD6XuqmAeiswGvUmNLjr5cFuXwNS77Q== -xml-js@^1.6.11: +xml-js@1.6.11: version "1.6.11" resolved "https://registry.yarnpkg.com/xml-js/-/xml-js-1.6.11.tgz#927d2f6947f7f1c19a316dd8eea3614e8b18f8e9" integrity sha512-7rVi2KMfwfWFl+GpPg6m80IVMWXLRjO+PxTq7V2CDhoGak0wzYzFgUY2m4XJ47OGdXd8eLE8EmwfAmdjw7lC1g== @@ -4323,7 +4480,7 @@ xmlbuilder@^15.1.1: resolved "https://registry.yarnpkg.com/xmlbuilder/-/xmlbuilder-15.1.1.tgz#9dcdce49eea66d8d10b42cae94a79c3c8d0c2ec5" integrity sha512-yMqGBqtXyeN1e3TGYvgNgDVZ3j84W4cwkOXQswghol6APgZWaff9lnbvN7MHYJOiXsvGPXtjTYJEiC9J2wv9Eg== -xstate@^4.34.0: +xstate@4.38.3: version "4.38.3" resolved "https://registry.yarnpkg.com/xstate/-/xstate-4.38.3.tgz#4e15e7ad3aa0ca1eea2010548a5379966d8f1075" integrity sha512-SH7nAaaPQx57dx6qvfcIgqKRXIh4L0A1iYEqim4s1u7c9VoCgzZc+63FY90AKU4ZzOC2cfJzTnpO4zK7fCUzzw== @@ -4371,6 +4528,32 @@ yargs-parser@^21.1.1: resolved "https://registry.yarnpkg.com/yargs-parser/-/yargs-parser-21.1.1.tgz#9096bceebf990d21bb31fa9516e0ede294a77d35" integrity sha512-tVpsJW7DdjecAiFpbIB1e3qxIQsE6NoPc5/eTdrbbIC4h0LVsWhnoa3g+m2HclBIujHzsxZ4VJVA+GUuc2/LBw== +yargs@17.6.2: + version "17.6.2" + resolved "https://registry.yarnpkg.com/yargs/-/yargs-17.6.2.tgz#2e23f2944e976339a1ee00f18c77fedee8332541" + integrity sha512-1/9UrdHjDZc0eOU0HxOHoS78C69UD3JRMvzlJ7S79S2nTaWRA/whGCTV8o9e/N/1Va9YIV7Q4sOxD8VV4pCWOw== + dependencies: + cliui "^8.0.1" + escalade "^3.1.1" + get-caller-file "^2.0.5" + require-directory "^2.1.1" + string-width "^4.2.3" + y18n "^5.0.5" + yargs-parser "^21.1.1" + +yargs@17.7.2, yargs@^17.7.2: + version "17.7.2" + resolved "https://registry.yarnpkg.com/yargs/-/yargs-17.7.2.tgz#991df39aca675a192b816e1e0363f9d75d2aa269" + integrity sha512-7dSzzRQ++CKnNI/krKnYRV7JKKPUXMEh61soaHKg9mrWEhzFWhFnxPxGl+69cD1Ou63C13NUPCnmIcrvqCuM6w== + dependencies: + cliui "^8.0.1" + escalade "^3.1.1" + get-caller-file "^2.0.5" + require-directory "^2.1.1" + string-width "^4.2.3" + y18n "^5.0.5" + yargs-parser "^21.1.1" + yargs@^15.4.1: version "15.4.1" resolved "https://registry.yarnpkg.com/yargs/-/yargs-15.4.1.tgz#0d87a16de01aee9d8bec2bfbf74f67851730f4f8" @@ -4401,19 +4584,6 @@ yargs@^16.0.0, yargs@^16.2.0: y18n "^5.0.5" yargs-parser "^20.2.2" -yargs@^17.6, yargs@^17.7.2: - version "17.7.2" - resolved "https://registry.yarnpkg.com/yargs/-/yargs-17.7.2.tgz#991df39aca675a192b816e1e0363f9d75d2aa269" - integrity sha512-7dSzzRQ++CKnNI/krKnYRV7JKKPUXMEh61soaHKg9mrWEhzFWhFnxPxGl+69cD1Ou63C13NUPCnmIcrvqCuM6w== - dependencies: - cliui "^8.0.1" - escalade "^3.1.1" - get-caller-file "^2.0.5" - require-directory "^2.1.1" - string-width "^4.2.3" - y18n "^5.0.5" - yargs-parser "^21.1.1" - yauzl@^2.10.0: version "2.10.0" resolved "https://registry.yarnpkg.com/yauzl/-/yauzl-2.10.0.tgz#c7eb17c93e112cb1086fa6d8e51fb0667b79a5f9" @@ -4427,7 +4597,7 @@ yocto-queue@^0.1.0: resolved "https://registry.yarnpkg.com/yocto-queue/-/yocto-queue-0.1.0.tgz#0294eb3dee05028d31ee1a5fa2c556a6aaf10a1b" integrity sha512-rVksvsnNCdJ/ohGc6xgPwyN8eheCxsiLM8mxuE/t/mOVqJewPuO1miLpTHQiRgTKCLexL4MeAFVagts7HmNZ2Q== -yoga-layout-prebuilt@^1.10.0, yoga-layout-prebuilt@^1.9.6: +yoga-layout-prebuilt@1.10.0, yoga-layout-prebuilt@^1.9.6: version "1.10.0" resolved "https://registry.yarnpkg.com/yoga-layout-prebuilt/-/yoga-layout-prebuilt-1.10.0.tgz#2936fbaf4b3628ee0b3e3b1df44936d6c146faa6" integrity sha512-YnOmtSbv4MTf7RGJMK0FvZ+KD8OEe/J5BNnR0GHhD8J/XcG/Qvxgszm0Un6FTHWW4uHlTgP0IztiXQnGyIR45g== @@ -4443,7 +4613,7 @@ zip-stream@^4.1.0: compress-commons "^4.1.2" readable-stream "^3.6.0" -zod@^3.22.4: +zod@3.22.4: version "3.22.4" resolved "https://registry.yarnpkg.com/zod/-/zod-3.22.4.tgz#f31c3a9386f61b1f228af56faa9255e845cf3fff" integrity sha512-iC+8Io04lddc+mVqQ9AZ7OQ2MrUKGN+oIQyq1vemgt46jwCwLfhq7/pwnBnNXXXZb8VTVLKwp9EDkx+ryxIWmg==