From f78cd0ff1aee3a85ad104055492049bc1ef73668 Mon Sep 17 00:00:00 2001
From: team-tf-cdk <84392119+team-tf-cdk@users.noreply.github.com>
Date: Thu, 16 Mar 2023 04:13:04 +0100
Subject: [PATCH] chore: upgrade provider from `3.13.0` to version `3.14.0`
(#305)
This PR upgrades provider to version 3.14.0
---
docs/API.csharp.md | 2 +
docs/API.go.md | 2 +
docs/API.java.md | 2 +
docs/API.python.md | 2 +
docs/API.typescript.md | 2 +
docs/auditRequestHeader.csharp.md | 786 +++++++++++++
docs/auditRequestHeader.go.md | 786 +++++++++++++
docs/auditRequestHeader.java.md | 893 ++++++++++++++
docs/auditRequestHeader.python.md | 918 +++++++++++++++
docs/auditRequestHeader.typescript.md | 774 +++++++++++++
docs/gcpSecretImpersonatedAccount.csharp.md | 873 ++++++++++++++
docs/gcpSecretImpersonatedAccount.go.md | 873 ++++++++++++++
docs/gcpSecretImpersonatedAccount.java.md | 1002 ++++++++++++++++
docs/gcpSecretImpersonatedAccount.python.md | 1029 +++++++++++++++++
...gcpSecretImpersonatedAccount.typescript.md | 859 ++++++++++++++
docs/pkiSecretBackendCrlConfig.csharp.md | 137 ++-
docs/pkiSecretBackendCrlConfig.go.md | 135 +++
docs/pkiSecretBackendCrlConfig.java.md | 177 +++
docs/pkiSecretBackendCrlConfig.python.md | 175 ++-
docs/pkiSecretBackendCrlConfig.typescript.md | 132 +++
package.json | 2 +-
src/ad-secret-backend/index.ts | 2 +-
src/ad-secret-library/index.ts | 2 +-
src/ad-secret-role/index.ts | 2 +-
src/alicloud-auth-backend-role/index.ts | 2 +-
src/approle-auth-backend-login/index.ts | 2 +-
.../index.ts | 2 +-
src/approle-auth-backend-role/index.ts | 2 +-
src/audit-request-header/README.md | 3 +
src/audit-request-header/index.ts | 157 +++
src/audit/index.ts | 2 +-
src/auth-backend/index.ts | 2 +-
src/aws-auth-backend-cert/index.ts | 2 +-
src/aws-auth-backend-client/index.ts | 2 +-
src/aws-auth-backend-config-identity/index.ts | 2 +-
.../index.ts | 2 +-
src/aws-auth-backend-login/index.ts | 2 +-
src/aws-auth-backend-role-tag/index.ts | 2 +-
src/aws-auth-backend-role/index.ts | 2 +-
.../index.ts | 2 +-
src/aws-auth-backend-sts-role/index.ts | 2 +-
src/aws-secret-backend-role/index.ts | 2 +-
src/aws-secret-backend/index.ts | 2 +-
src/azure-auth-backend-config/index.ts | 2 +-
src/azure-auth-backend-role/index.ts | 2 +-
src/azure-secret-backend-role/index.ts | 2 +-
src/azure-secret-backend/index.ts | 2 +-
src/cert-auth-backend-role/index.ts | 2 +-
src/consul-secret-backend-role/index.ts | 2 +-
src/consul-secret-backend/index.ts | 2 +-
src/data-vault-ad-access-credentials/index.ts | 2 +-
.../index.ts | 2 +-
src/data-vault-auth-backend/index.ts | 2 +-
.../index.ts | 2 +-
.../index.ts | 2 +-
src/data-vault-gcp-auth-backend-role/index.ts | 2 +-
src/data-vault-generic-secret/index.ts | 2 +-
src/data-vault-identity-entity/index.ts | 2 +-
src/data-vault-identity-group/index.ts | 2 +-
.../index.ts | 2 +-
.../index.ts | 2 +-
.../index.ts | 2 +-
.../index.ts | 2 +-
.../index.ts | 2 +-
.../index.ts | 2 +-
src/data-vault-kv-secret-subkeys-v2/index.ts | 2 +-
src/data-vault-kv-secret-v2/index.ts | 2 +-
src/data-vault-kv-secret/index.ts | 2 +-
src/data-vault-kv-secrets-list-v2/index.ts | 2 +-
src/data-vault-kv-secrets-list/index.ts | 2 +-
src/data-vault-nomad-access-token/index.ts | 2 +-
src/data-vault-policy-document/index.ts | 2 +-
src/data-vault-raft-autopilot-state/index.ts | 2 +-
src/data-vault-transform-decode/index.ts | 2 +-
src/data-vault-transform-encode/index.ts | 2 +-
src/data-vault-transit-decrypt/index.ts | 2 +-
src/data-vault-transit-encrypt/index.ts | 2 +-
.../index.ts | 2 +-
src/database-secret-backend-role/index.ts | 2 +-
.../index.ts | 2 +-
src/database-secrets-mount/index.ts | 2 +-
src/egp-policy/index.ts | 2 +-
src/gcp-auth-backend-role/index.ts | 2 +-
src/gcp-auth-backend/index.ts | 2 +-
src/gcp-secret-backend/index.ts | 2 +-
src/gcp-secret-impersonated-account/README.md | 3 +
src/gcp-secret-impersonated-account/index.ts | 204 ++++
src/gcp-secret-roleset/index.ts | 2 +-
src/gcp-secret-static-account/index.ts | 2 +-
src/generic-endpoint/index.ts | 2 +-
src/generic-secret/index.ts | 2 +-
src/github-auth-backend/index.ts | 2 +-
src/github-team/index.ts | 2 +-
src/github-user/index.ts | 2 +-
src/identity-entity-alias/index.ts | 2 +-
src/identity-entity-policies/index.ts | 2 +-
src/identity-entity/index.ts | 2 +-
src/identity-group-alias/index.ts | 2 +-
src/identity-group-member-entity-ids/index.ts | 2 +-
src/identity-group-member-group-ids/index.ts | 2 +-
src/identity-group-policies/index.ts | 2 +-
src/identity-group/index.ts | 2 +-
src/identity-mfa-duo/index.ts | 2 +-
src/identity-mfa-login-enforcement/index.ts | 2 +-
src/identity-mfa-okta/index.ts | 2 +-
src/identity-mfa-pingid/index.ts | 2 +-
src/identity-mfa-totp/index.ts | 2 +-
src/identity-oidc-assignment/index.ts | 2 +-
src/identity-oidc-client/index.ts | 2 +-
.../index.ts | 2 +-
src/identity-oidc-key/index.ts | 2 +-
src/identity-oidc-provider/index.ts | 2 +-
src/identity-oidc-role/index.ts | 2 +-
src/identity-oidc-scope/index.ts | 2 +-
src/identity-oidc/index.ts | 2 +-
src/index.ts | 2 +
src/jwt-auth-backend-role/index.ts | 2 +-
src/jwt-auth-backend/index.ts | 2 +-
src/kmip-secret-backend/index.ts | 2 +-
src/kmip-secret-role/index.ts | 2 +-
src/kmip-secret-scope/index.ts | 2 +-
src/kubernetes-auth-backend-config/index.ts | 2 +-
src/kubernetes-auth-backend-role/index.ts | 2 +-
src/kubernetes-secret-backend-role/index.ts | 2 +-
src/kubernetes-secret-backend/index.ts | 2 +-
src/kv-secret-backend-v2/index.ts | 2 +-
src/kv-secret-v2/index.ts | 2 +-
src/kv-secret/index.ts | 2 +-
src/ldap-auth-backend-group/index.ts | 2 +-
src/ldap-auth-backend-user/index.ts | 2 +-
src/ldap-auth-backend/index.ts | 2 +-
src/managed-keys/index.ts | 2 +-
src/mfa-duo/index.ts | 2 +-
src/mfa-okta/index.ts | 2 +-
src/mfa-pingid/index.ts | 2 +-
src/mfa-totp/index.ts | 2 +-
src/mount/index.ts | 2 +-
src/namespace/index.ts | 2 +-
src/nomad-secret-backend/index.ts | 2 +-
src/nomad-secret-role/index.ts | 2 +-
src/okta-auth-backend-group/index.ts | 2 +-
src/okta-auth-backend-user/index.ts | 2 +-
src/okta-auth-backend/index.ts | 2 +-
src/password-policy/index.ts | 2 +-
src/pki-secret-backend-cert/index.ts | 2 +-
src/pki-secret-backend-config-ca/index.ts | 2 +-
src/pki-secret-backend-config-urls/index.ts | 2 +-
src/pki-secret-backend-crl-config/index.ts | 74 +-
.../index.ts | 2 +-
.../index.ts | 2 +-
src/pki-secret-backend-role/index.ts | 2 +-
src/pki-secret-backend-root-cert/index.ts | 2 +-
.../index.ts | 2 +-
src/pki-secret-backend-sign/index.ts | 2 +-
src/policy/index.ts | 2 +-
src/provider/index.ts | 2 +-
src/quota-lease-count/index.ts | 2 +-
src/quota-rate-limit/index.ts | 2 +-
src/rabbitmq-secret-backend-role/index.ts | 2 +-
src/rabbitmq-secret-backend/index.ts | 2 +-
src/raft-autopilot/index.ts | 2 +-
src/raft-snapshot-agent-config/index.ts | 2 +-
src/rgp-policy/index.ts | 2 +-
src/ssh-secret-backend-ca/index.ts | 2 +-
src/ssh-secret-backend-role/index.ts | 2 +-
src/terraform-cloud-secret-backend/index.ts | 2 +-
src/terraform-cloud-secret-creds/index.ts | 2 +-
src/terraform-cloud-secret-role/index.ts | 2 +-
src/token-auth-backend-role/index.ts | 2 +-
src/token/index.ts | 2 +-
src/transform-alphabet/index.ts | 2 +-
src/transform-role/index.ts | 2 +-
src/transform-template/index.ts | 2 +-
src/transform-transformation/index.ts | 2 +-
src/transit-secret-backend-key/index.ts | 2 +-
src/transit-secret-cache-config/index.ts | 2 +-
src/version.json | 2 +-
177 files changed, 10149 insertions(+), 155 deletions(-)
create mode 100644 docs/auditRequestHeader.csharp.md
create mode 100644 docs/auditRequestHeader.go.md
create mode 100644 docs/auditRequestHeader.java.md
create mode 100644 docs/auditRequestHeader.python.md
create mode 100644 docs/auditRequestHeader.typescript.md
create mode 100644 docs/gcpSecretImpersonatedAccount.csharp.md
create mode 100644 docs/gcpSecretImpersonatedAccount.go.md
create mode 100644 docs/gcpSecretImpersonatedAccount.java.md
create mode 100644 docs/gcpSecretImpersonatedAccount.python.md
create mode 100644 docs/gcpSecretImpersonatedAccount.typescript.md
create mode 100644 src/audit-request-header/README.md
create mode 100644 src/audit-request-header/index.ts
create mode 100644 src/gcp-secret-impersonated-account/README.md
create mode 100644 src/gcp-secret-impersonated-account/index.ts
diff --git a/docs/API.csharp.md b/docs/API.csharp.md
index 5f7d6a193..4e6c40af3 100644
--- a/docs/API.csharp.md
+++ b/docs/API.csharp.md
@@ -9,6 +9,7 @@ The following submodules are available:
- [approleAuthBackendRole](./approleAuthBackendRole.csharp.md)
- [approleAuthBackendRoleSecretId](./approleAuthBackendRoleSecretId.csharp.md)
- [audit](./audit.csharp.md)
+- [auditRequestHeader](./auditRequestHeader.csharp.md)
- [authBackend](./authBackend.csharp.md)
- [awsAuthBackendCert](./awsAuthBackendCert.csharp.md)
- [awsAuthBackendClient](./awsAuthBackendClient.csharp.md)
@@ -63,6 +64,7 @@ The following submodules are available:
- [gcpAuthBackend](./gcpAuthBackend.csharp.md)
- [gcpAuthBackendRole](./gcpAuthBackendRole.csharp.md)
- [gcpSecretBackend](./gcpSecretBackend.csharp.md)
+- [gcpSecretImpersonatedAccount](./gcpSecretImpersonatedAccount.csharp.md)
- [gcpSecretRoleset](./gcpSecretRoleset.csharp.md)
- [gcpSecretStaticAccount](./gcpSecretStaticAccount.csharp.md)
- [genericEndpoint](./genericEndpoint.csharp.md)
diff --git a/docs/API.go.md b/docs/API.go.md
index 1bef9fa50..015f8689b 100644
--- a/docs/API.go.md
+++ b/docs/API.go.md
@@ -9,6 +9,7 @@ The following submodules are available:
- [approleAuthBackendRole](./approleAuthBackendRole.go.md)
- [approleAuthBackendRoleSecretId](./approleAuthBackendRoleSecretId.go.md)
- [audit](./audit.go.md)
+- [auditRequestHeader](./auditRequestHeader.go.md)
- [authBackend](./authBackend.go.md)
- [awsAuthBackendCert](./awsAuthBackendCert.go.md)
- [awsAuthBackendClient](./awsAuthBackendClient.go.md)
@@ -63,6 +64,7 @@ The following submodules are available:
- [gcpAuthBackend](./gcpAuthBackend.go.md)
- [gcpAuthBackendRole](./gcpAuthBackendRole.go.md)
- [gcpSecretBackend](./gcpSecretBackend.go.md)
+- [gcpSecretImpersonatedAccount](./gcpSecretImpersonatedAccount.go.md)
- [gcpSecretRoleset](./gcpSecretRoleset.go.md)
- [gcpSecretStaticAccount](./gcpSecretStaticAccount.go.md)
- [genericEndpoint](./genericEndpoint.go.md)
diff --git a/docs/API.java.md b/docs/API.java.md
index 96531b3e2..804397aa1 100644
--- a/docs/API.java.md
+++ b/docs/API.java.md
@@ -9,6 +9,7 @@ The following submodules are available:
- [approleAuthBackendRole](./approleAuthBackendRole.java.md)
- [approleAuthBackendRoleSecretId](./approleAuthBackendRoleSecretId.java.md)
- [audit](./audit.java.md)
+- [auditRequestHeader](./auditRequestHeader.java.md)
- [authBackend](./authBackend.java.md)
- [awsAuthBackendCert](./awsAuthBackendCert.java.md)
- [awsAuthBackendClient](./awsAuthBackendClient.java.md)
@@ -63,6 +64,7 @@ The following submodules are available:
- [gcpAuthBackend](./gcpAuthBackend.java.md)
- [gcpAuthBackendRole](./gcpAuthBackendRole.java.md)
- [gcpSecretBackend](./gcpSecretBackend.java.md)
+- [gcpSecretImpersonatedAccount](./gcpSecretImpersonatedAccount.java.md)
- [gcpSecretRoleset](./gcpSecretRoleset.java.md)
- [gcpSecretStaticAccount](./gcpSecretStaticAccount.java.md)
- [genericEndpoint](./genericEndpoint.java.md)
diff --git a/docs/API.python.md b/docs/API.python.md
index f4d4fb106..56fc520bd 100644
--- a/docs/API.python.md
+++ b/docs/API.python.md
@@ -9,6 +9,7 @@ The following submodules are available:
- [approleAuthBackendRole](./approleAuthBackendRole.python.md)
- [approleAuthBackendRoleSecretId](./approleAuthBackendRoleSecretId.python.md)
- [audit](./audit.python.md)
+- [auditRequestHeader](./auditRequestHeader.python.md)
- [authBackend](./authBackend.python.md)
- [awsAuthBackendCert](./awsAuthBackendCert.python.md)
- [awsAuthBackendClient](./awsAuthBackendClient.python.md)
@@ -63,6 +64,7 @@ The following submodules are available:
- [gcpAuthBackend](./gcpAuthBackend.python.md)
- [gcpAuthBackendRole](./gcpAuthBackendRole.python.md)
- [gcpSecretBackend](./gcpSecretBackend.python.md)
+- [gcpSecretImpersonatedAccount](./gcpSecretImpersonatedAccount.python.md)
- [gcpSecretRoleset](./gcpSecretRoleset.python.md)
- [gcpSecretStaticAccount](./gcpSecretStaticAccount.python.md)
- [genericEndpoint](./genericEndpoint.python.md)
diff --git a/docs/API.typescript.md b/docs/API.typescript.md
index 158aaa259..0a4026948 100644
--- a/docs/API.typescript.md
+++ b/docs/API.typescript.md
@@ -9,6 +9,7 @@ The following submodules are available:
- [approleAuthBackendRole](./approleAuthBackendRole.typescript.md)
- [approleAuthBackendRoleSecretId](./approleAuthBackendRoleSecretId.typescript.md)
- [audit](./audit.typescript.md)
+- [auditRequestHeader](./auditRequestHeader.typescript.md)
- [authBackend](./authBackend.typescript.md)
- [awsAuthBackendCert](./awsAuthBackendCert.typescript.md)
- [awsAuthBackendClient](./awsAuthBackendClient.typescript.md)
@@ -63,6 +64,7 @@ The following submodules are available:
- [gcpAuthBackend](./gcpAuthBackend.typescript.md)
- [gcpAuthBackendRole](./gcpAuthBackendRole.typescript.md)
- [gcpSecretBackend](./gcpSecretBackend.typescript.md)
+- [gcpSecretImpersonatedAccount](./gcpSecretImpersonatedAccount.typescript.md)
- [gcpSecretRoleset](./gcpSecretRoleset.typescript.md)
- [gcpSecretStaticAccount](./gcpSecretStaticAccount.typescript.md)
- [genericEndpoint](./genericEndpoint.typescript.md)
diff --git a/docs/auditRequestHeader.csharp.md b/docs/auditRequestHeader.csharp.md
new file mode 100644
index 000000000..f5c89e47f
--- /dev/null
+++ b/docs/auditRequestHeader.csharp.md
@@ -0,0 +1,786 @@
+# `auditRequestHeader` Submodule
+
+## Constructs
+
+### AuditRequestHeader
+
+Represents a {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header vault_audit_request_header}.
+
+#### Initializers
+
+```csharp
+using HashiCorp.Cdktf.Providers.Vault;
+
+new AuditRequestHeader(Construct Scope, string Id, AuditRequestHeaderConfig Config);
+```
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| Scope
| Constructs.Construct
| The scope in which to define this construct. |
+| Id
| string
| The scoped construct ID. |
+| Config
| AuditRequestHeaderConfig
| *No description.* |
+
+---
+
+##### `Scope`Required
+
+- *Type:* Constructs.Construct
+
+The scope in which to define this construct.
+
+---
+
+##### `Id`Required
+
+- *Type:* string
+
+The scoped construct ID.
+
+Must be unique amongst siblings in the same scope
+
+---
+
+##### `Config`Required
+
+- *Type:* AuditRequestHeaderConfig
+
+---
+
+#### Methods
+
+| **Name** | **Description** |
+| --- | --- |
+| ToString
| Returns a string representation of this construct. |
+| AddOverride
| *No description.* |
+| OverrideLogicalId
| Overrides the auto-generated logical ID with a specific ID. |
+| ResetOverrideLogicalId
| Resets a previously passed logical Id to use the auto-generated logical id again. |
+| ToMetadata
| *No description.* |
+| ToTerraform
| Adds this resource to the terraform JSON output. |
+| GetAnyMapAttribute
| *No description.* |
+| GetBooleanAttribute
| *No description.* |
+| GetBooleanMapAttribute
| *No description.* |
+| GetListAttribute
| *No description.* |
+| GetNumberAttribute
| *No description.* |
+| GetNumberListAttribute
| *No description.* |
+| GetNumberMapAttribute
| *No description.* |
+| GetStringAttribute
| *No description.* |
+| GetStringMapAttribute
| *No description.* |
+| InterpolationForAttribute
| *No description.* |
+| ResetHmac
| *No description.* |
+| ResetId
| *No description.* |
+| ResetNamespace
| *No description.* |
+
+---
+
+##### `ToString`
+
+```csharp
+private string ToString()
+```
+
+Returns a string representation of this construct.
+
+##### `AddOverride`
+
+```csharp
+private void AddOverride(string Path, object Value)
+```
+
+###### `Path`Required
+
+- *Type:* string
+
+---
+
+###### `Value`Required
+
+- *Type:* object
+
+---
+
+##### `OverrideLogicalId`
+
+```csharp
+private void OverrideLogicalId(string NewLogicalId)
+```
+
+Overrides the auto-generated logical ID with a specific ID.
+
+###### `NewLogicalId`Required
+
+- *Type:* string
+
+The new logical ID to use for this stack element.
+
+---
+
+##### `ResetOverrideLogicalId`
+
+```csharp
+private void ResetOverrideLogicalId()
+```
+
+Resets a previously passed logical Id to use the auto-generated logical id again.
+
+##### `ToMetadata`
+
+```csharp
+private object ToMetadata()
+```
+
+##### `ToTerraform`
+
+```csharp
+private object ToTerraform()
+```
+
+Adds this resource to the terraform JSON output.
+
+##### `GetAnyMapAttribute`
+
+```csharp
+private System.Collections.Generic.IDictionary GetAnyMapAttribute(string TerraformAttribute)
+```
+
+###### `TerraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `GetBooleanAttribute`
+
+```csharp
+private IResolvable GetBooleanAttribute(string TerraformAttribute)
+```
+
+###### `TerraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `GetBooleanMapAttribute`
+
+```csharp
+private System.Collections.Generic.IDictionary GetBooleanMapAttribute(string TerraformAttribute)
+```
+
+###### `TerraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `GetListAttribute`
+
+```csharp
+private string[] GetListAttribute(string TerraformAttribute)
+```
+
+###### `TerraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `GetNumberAttribute`
+
+```csharp
+private double GetNumberAttribute(string TerraformAttribute)
+```
+
+###### `TerraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `GetNumberListAttribute`
+
+```csharp
+private double[] GetNumberListAttribute(string TerraformAttribute)
+```
+
+###### `TerraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `GetNumberMapAttribute`
+
+```csharp
+private System.Collections.Generic.IDictionary GetNumberMapAttribute(string TerraformAttribute)
+```
+
+###### `TerraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `GetStringAttribute`
+
+```csharp
+private string GetStringAttribute(string TerraformAttribute)
+```
+
+###### `TerraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `GetStringMapAttribute`
+
+```csharp
+private System.Collections.Generic.IDictionary GetStringMapAttribute(string TerraformAttribute)
+```
+
+###### `TerraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `InterpolationForAttribute`
+
+```csharp
+private IResolvable InterpolationForAttribute(string TerraformAttribute)
+```
+
+###### `TerraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `ResetHmac`
+
+```csharp
+private void ResetHmac()
+```
+
+##### `ResetId`
+
+```csharp
+private void ResetId()
+```
+
+##### `ResetNamespace`
+
+```csharp
+private void ResetNamespace()
+```
+
+#### Static Functions
+
+| **Name** | **Description** |
+| --- | --- |
+| IsConstruct
| Checks if `x` is a construct. |
+| IsTerraformElement
| *No description.* |
+| IsTerraformResource
| *No description.* |
+
+---
+
+##### `IsConstruct`
+
+```csharp
+using HashiCorp.Cdktf.Providers.Vault;
+
+AuditRequestHeader.IsConstruct(object X);
+```
+
+Checks if `x` is a construct.
+
+Use this method instead of `instanceof` to properly detect `Construct`
+instances, even when the construct library is symlinked.
+
+Explanation: in JavaScript, multiple copies of the `constructs` library on
+disk are seen as independent, completely different libraries. As a
+consequence, the class `Construct` in each copy of the `constructs` library
+is seen as a different class, and an instance of one class will not test as
+`instanceof` the other class. `npm install` will not create installations
+like this, but users may manually symlink construct libraries together or
+use a monorepo tool: in those cases, multiple copies of the `constructs`
+library can be accidentally installed, and `instanceof` will behave
+unpredictably. It is safest to avoid using `instanceof`, and using
+this type-testing method instead.
+
+###### `X`Required
+
+- *Type:* object
+
+Any object.
+
+---
+
+##### `IsTerraformElement`
+
+```csharp
+using HashiCorp.Cdktf.Providers.Vault;
+
+AuditRequestHeader.IsTerraformElement(object X);
+```
+
+###### `X`Required
+
+- *Type:* object
+
+---
+
+##### `IsTerraformResource`
+
+```csharp
+using HashiCorp.Cdktf.Providers.Vault;
+
+AuditRequestHeader.IsTerraformResource(object X);
+```
+
+###### `X`Required
+
+- *Type:* object
+
+---
+
+#### Properties
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| Node
| Constructs.Node
| The tree node. |
+| CdktfStack
| HashiCorp.Cdktf.TerraformStack
| *No description.* |
+| Fqn
| string
| *No description.* |
+| FriendlyUniqueId
| string
| *No description.* |
+| TerraformMetaArguments
| System.Collections.Generic.IDictionary
| *No description.* |
+| TerraformResourceType
| string
| *No description.* |
+| TerraformGeneratorMetadata
| HashiCorp.Cdktf.TerraformProviderGeneratorMetadata
| *No description.* |
+| Connection
| object
| *No description.* |
+| Count
| double
| *No description.* |
+| DependsOn
| string[]
| *No description.* |
+| ForEach
| HashiCorp.Cdktf.ITerraformIterator
| *No description.* |
+| Lifecycle
| HashiCorp.Cdktf.TerraformResourceLifecycle
| *No description.* |
+| Provider
| HashiCorp.Cdktf.TerraformProvider
| *No description.* |
+| Provisioners
| object[]
| *No description.* |
+| HmacInput
| object
| *No description.* |
+| IdInput
| string
| *No description.* |
+| NameInput
| string
| *No description.* |
+| NamespaceInput
| string
| *No description.* |
+| Hmac
| object
| *No description.* |
+| Id
| string
| *No description.* |
+| Name
| string
| *No description.* |
+| Namespace
| string
| *No description.* |
+
+---
+
+##### `Node`Required
+
+```csharp
+public Node Node { get; }
+```
+
+- *Type:* Constructs.Node
+
+The tree node.
+
+---
+
+##### `CdktfStack`Required
+
+```csharp
+public TerraformStack CdktfStack { get; }
+```
+
+- *Type:* HashiCorp.Cdktf.TerraformStack
+
+---
+
+##### `Fqn`Required
+
+```csharp
+public string Fqn { get; }
+```
+
+- *Type:* string
+
+---
+
+##### `FriendlyUniqueId`Required
+
+```csharp
+public string FriendlyUniqueId { get; }
+```
+
+- *Type:* string
+
+---
+
+##### `TerraformMetaArguments`Required
+
+```csharp
+public System.Collections.Generic.IDictionary TerraformMetaArguments { get; }
+```
+
+- *Type:* System.Collections.Generic.IDictionary
+
+---
+
+##### `TerraformResourceType`Required
+
+```csharp
+public string TerraformResourceType { get; }
+```
+
+- *Type:* string
+
+---
+
+##### `TerraformGeneratorMetadata`Optional
+
+```csharp
+public TerraformProviderGeneratorMetadata TerraformGeneratorMetadata { get; }
+```
+
+- *Type:* HashiCorp.Cdktf.TerraformProviderGeneratorMetadata
+
+---
+
+##### `Connection`Optional
+
+```csharp
+public object Connection { get; }
+```
+
+- *Type:* object
+
+---
+
+##### `Count`Optional
+
+```csharp
+public double Count { get; }
+```
+
+- *Type:* double
+
+---
+
+##### `DependsOn`Optional
+
+```csharp
+public string[] DependsOn { get; }
+```
+
+- *Type:* string[]
+
+---
+
+##### `ForEach`Optional
+
+```csharp
+public ITerraformIterator ForEach { get; }
+```
+
+- *Type:* HashiCorp.Cdktf.ITerraformIterator
+
+---
+
+##### `Lifecycle`Optional
+
+```csharp
+public TerraformResourceLifecycle Lifecycle { get; }
+```
+
+- *Type:* HashiCorp.Cdktf.TerraformResourceLifecycle
+
+---
+
+##### `Provider`Optional
+
+```csharp
+public TerraformProvider Provider { get; }
+```
+
+- *Type:* HashiCorp.Cdktf.TerraformProvider
+
+---
+
+##### `Provisioners`Optional
+
+```csharp
+public object[] Provisioners { get; }
+```
+
+- *Type:* object[]
+
+---
+
+##### `HmacInput`Optional
+
+```csharp
+public object HmacInput { get; }
+```
+
+- *Type:* object
+
+---
+
+##### `IdInput`Optional
+
+```csharp
+public string IdInput { get; }
+```
+
+- *Type:* string
+
+---
+
+##### `NameInput`Optional
+
+```csharp
+public string NameInput { get; }
+```
+
+- *Type:* string
+
+---
+
+##### `NamespaceInput`Optional
+
+```csharp
+public string NamespaceInput { get; }
+```
+
+- *Type:* string
+
+---
+
+##### `Hmac`Required
+
+```csharp
+public object Hmac { get; }
+```
+
+- *Type:* object
+
+---
+
+##### `Id`Required
+
+```csharp
+public string Id { get; }
+```
+
+- *Type:* string
+
+---
+
+##### `Name`Required
+
+```csharp
+public string Name { get; }
+```
+
+- *Type:* string
+
+---
+
+##### `Namespace`Required
+
+```csharp
+public string Namespace { get; }
+```
+
+- *Type:* string
+
+---
+
+#### Constants
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| TfResourceType
| string
| *No description.* |
+
+---
+
+##### `TfResourceType`Required
+
+```csharp
+public string TfResourceType { get; }
+```
+
+- *Type:* string
+
+---
+
+## Structs
+
+### AuditRequestHeaderConfig
+
+#### Initializer
+
+```csharp
+using HashiCorp.Cdktf.Providers.Vault;
+
+new AuditRequestHeaderConfig {
+ object Connection = null,
+ double Count = null,
+ ITerraformDependable[] DependsOn = null,
+ ITerraformIterator ForEach = null,
+ TerraformResourceLifecycle Lifecycle = null,
+ TerraformProvider Provider = null,
+ object[] Provisioners = null,
+ string Name,
+ object Hmac = null,
+ string Id = null,
+ string Namespace = null
+};
+```
+
+#### Properties
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| Connection
| object
| *No description.* |
+| Count
| double
| *No description.* |
+| DependsOn
| HashiCorp.Cdktf.ITerraformDependable[]
| *No description.* |
+| ForEach
| HashiCorp.Cdktf.ITerraformIterator
| *No description.* |
+| Lifecycle
| HashiCorp.Cdktf.TerraformResourceLifecycle
| *No description.* |
+| Provider
| HashiCorp.Cdktf.TerraformProvider
| *No description.* |
+| Provisioners
| object[]
| *No description.* |
+| Name
| string
| The name of the request header to audit. |
+| Hmac
| object
| Whether this header's value should be HMAC'd in the audit logs. |
+| Id
| string
| Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id}. |
+| Namespace
| string
| Target namespace. (requires Enterprise). |
+
+---
+
+##### `Connection`Optional
+
+```csharp
+public object Connection { get; set; }
+```
+
+- *Type:* object
+
+---
+
+##### `Count`Optional
+
+```csharp
+public double Count { get; set; }
+```
+
+- *Type:* double
+
+---
+
+##### `DependsOn`Optional
+
+```csharp
+public ITerraformDependable[] DependsOn { get; set; }
+```
+
+- *Type:* HashiCorp.Cdktf.ITerraformDependable[]
+
+---
+
+##### `ForEach`Optional
+
+```csharp
+public ITerraformIterator ForEach { get; set; }
+```
+
+- *Type:* HashiCorp.Cdktf.ITerraformIterator
+
+---
+
+##### `Lifecycle`Optional
+
+```csharp
+public TerraformResourceLifecycle Lifecycle { get; set; }
+```
+
+- *Type:* HashiCorp.Cdktf.TerraformResourceLifecycle
+
+---
+
+##### `Provider`Optional
+
+```csharp
+public TerraformProvider Provider { get; set; }
+```
+
+- *Type:* HashiCorp.Cdktf.TerraformProvider
+
+---
+
+##### `Provisioners`Optional
+
+```csharp
+public object[] Provisioners { get; set; }
+```
+
+- *Type:* object[]
+
+---
+
+##### `Name`Required
+
+```csharp
+public string Name { get; set; }
+```
+
+- *Type:* string
+
+The name of the request header to audit.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#name AuditRequestHeader#name}
+
+---
+
+##### `Hmac`Optional
+
+```csharp
+public object Hmac { get; set; }
+```
+
+- *Type:* object
+
+Whether this header's value should be HMAC'd in the audit logs.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#hmac AuditRequestHeader#hmac}
+
+---
+
+##### `Id`Optional
+
+```csharp
+public string Id { get; set; }
+```
+
+- *Type:* string
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id}.
+
+Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
+If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
+
+---
+
+##### `Namespace`Optional
+
+```csharp
+public string Namespace { get; set; }
+```
+
+- *Type:* string
+
+Target namespace. (requires Enterprise).
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#namespace AuditRequestHeader#namespace}
+
+---
+
+
+
diff --git a/docs/auditRequestHeader.go.md b/docs/auditRequestHeader.go.md
new file mode 100644
index 000000000..d829be391
--- /dev/null
+++ b/docs/auditRequestHeader.go.md
@@ -0,0 +1,786 @@
+# `auditRequestHeader` Submodule
+
+## Constructs
+
+### AuditRequestHeader
+
+Represents a {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header vault_audit_request_header}.
+
+#### Initializers
+
+```go
+import "github.com/cdktf/cdktf-provider-vault-go/vault/v5/auditrequestheader"
+
+auditrequestheader.NewAuditRequestHeader(scope Construct, id *string, config AuditRequestHeaderConfig) AuditRequestHeader
+```
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| scope
| github.com/aws/constructs-go/constructs/v10.Construct
| The scope in which to define this construct. |
+| id
| *string
| The scoped construct ID. |
+| config
| AuditRequestHeaderConfig
| *No description.* |
+
+---
+
+##### `scope`Required
+
+- *Type:* github.com/aws/constructs-go/constructs/v10.Construct
+
+The scope in which to define this construct.
+
+---
+
+##### `id`Required
+
+- *Type:* *string
+
+The scoped construct ID.
+
+Must be unique amongst siblings in the same scope
+
+---
+
+##### `config`Required
+
+- *Type:* AuditRequestHeaderConfig
+
+---
+
+#### Methods
+
+| **Name** | **Description** |
+| --- | --- |
+| ToString
| Returns a string representation of this construct. |
+| AddOverride
| *No description.* |
+| OverrideLogicalId
| Overrides the auto-generated logical ID with a specific ID. |
+| ResetOverrideLogicalId
| Resets a previously passed logical Id to use the auto-generated logical id again. |
+| ToMetadata
| *No description.* |
+| ToTerraform
| Adds this resource to the terraform JSON output. |
+| GetAnyMapAttribute
| *No description.* |
+| GetBooleanAttribute
| *No description.* |
+| GetBooleanMapAttribute
| *No description.* |
+| GetListAttribute
| *No description.* |
+| GetNumberAttribute
| *No description.* |
+| GetNumberListAttribute
| *No description.* |
+| GetNumberMapAttribute
| *No description.* |
+| GetStringAttribute
| *No description.* |
+| GetStringMapAttribute
| *No description.* |
+| InterpolationForAttribute
| *No description.* |
+| ResetHmac
| *No description.* |
+| ResetId
| *No description.* |
+| ResetNamespace
| *No description.* |
+
+---
+
+##### `ToString`
+
+```go
+func ToString() *string
+```
+
+Returns a string representation of this construct.
+
+##### `AddOverride`
+
+```go
+func AddOverride(path *string, value interface{})
+```
+
+###### `path`Required
+
+- *Type:* *string
+
+---
+
+###### `value`Required
+
+- *Type:* interface{}
+
+---
+
+##### `OverrideLogicalId`
+
+```go
+func OverrideLogicalId(newLogicalId *string)
+```
+
+Overrides the auto-generated logical ID with a specific ID.
+
+###### `newLogicalId`Required
+
+- *Type:* *string
+
+The new logical ID to use for this stack element.
+
+---
+
+##### `ResetOverrideLogicalId`
+
+```go
+func ResetOverrideLogicalId()
+```
+
+Resets a previously passed logical Id to use the auto-generated logical id again.
+
+##### `ToMetadata`
+
+```go
+func ToMetadata() interface{}
+```
+
+##### `ToTerraform`
+
+```go
+func ToTerraform() interface{}
+```
+
+Adds this resource to the terraform JSON output.
+
+##### `GetAnyMapAttribute`
+
+```go
+func GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{}
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* *string
+
+---
+
+##### `GetBooleanAttribute`
+
+```go
+func GetBooleanAttribute(terraformAttribute *string) IResolvable
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* *string
+
+---
+
+##### `GetBooleanMapAttribute`
+
+```go
+func GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* *string
+
+---
+
+##### `GetListAttribute`
+
+```go
+func GetListAttribute(terraformAttribute *string) *[]*string
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* *string
+
+---
+
+##### `GetNumberAttribute`
+
+```go
+func GetNumberAttribute(terraformAttribute *string) *f64
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* *string
+
+---
+
+##### `GetNumberListAttribute`
+
+```go
+func GetNumberListAttribute(terraformAttribute *string) *[]*f64
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* *string
+
+---
+
+##### `GetNumberMapAttribute`
+
+```go
+func GetNumberMapAttribute(terraformAttribute *string) *map[string]*f64
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* *string
+
+---
+
+##### `GetStringAttribute`
+
+```go
+func GetStringAttribute(terraformAttribute *string) *string
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* *string
+
+---
+
+##### `GetStringMapAttribute`
+
+```go
+func GetStringMapAttribute(terraformAttribute *string) *map[string]*string
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* *string
+
+---
+
+##### `InterpolationForAttribute`
+
+```go
+func InterpolationForAttribute(terraformAttribute *string) IResolvable
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* *string
+
+---
+
+##### `ResetHmac`
+
+```go
+func ResetHmac()
+```
+
+##### `ResetId`
+
+```go
+func ResetId()
+```
+
+##### `ResetNamespace`
+
+```go
+func ResetNamespace()
+```
+
+#### Static Functions
+
+| **Name** | **Description** |
+| --- | --- |
+| IsConstruct
| Checks if `x` is a construct. |
+| IsTerraformElement
| *No description.* |
+| IsTerraformResource
| *No description.* |
+
+---
+
+##### `IsConstruct`
+
+```go
+import "github.com/cdktf/cdktf-provider-vault-go/vault/v5/auditrequestheader"
+
+auditrequestheader.AuditRequestHeader_IsConstruct(x interface{}) *bool
+```
+
+Checks if `x` is a construct.
+
+Use this method instead of `instanceof` to properly detect `Construct`
+instances, even when the construct library is symlinked.
+
+Explanation: in JavaScript, multiple copies of the `constructs` library on
+disk are seen as independent, completely different libraries. As a
+consequence, the class `Construct` in each copy of the `constructs` library
+is seen as a different class, and an instance of one class will not test as
+`instanceof` the other class. `npm install` will not create installations
+like this, but users may manually symlink construct libraries together or
+use a monorepo tool: in those cases, multiple copies of the `constructs`
+library can be accidentally installed, and `instanceof` will behave
+unpredictably. It is safest to avoid using `instanceof`, and using
+this type-testing method instead.
+
+###### `x`Required
+
+- *Type:* interface{}
+
+Any object.
+
+---
+
+##### `IsTerraformElement`
+
+```go
+import "github.com/cdktf/cdktf-provider-vault-go/vault/v5/auditrequestheader"
+
+auditrequestheader.AuditRequestHeader_IsTerraformElement(x interface{}) *bool
+```
+
+###### `x`Required
+
+- *Type:* interface{}
+
+---
+
+##### `IsTerraformResource`
+
+```go
+import "github.com/cdktf/cdktf-provider-vault-go/vault/v5/auditrequestheader"
+
+auditrequestheader.AuditRequestHeader_IsTerraformResource(x interface{}) *bool
+```
+
+###### `x`Required
+
+- *Type:* interface{}
+
+---
+
+#### Properties
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| Node
| github.com/aws/constructs-go/constructs/v10.Node
| The tree node. |
+| CdktfStack
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformStack
| *No description.* |
+| Fqn
| *string
| *No description.* |
+| FriendlyUniqueId
| *string
| *No description.* |
+| TerraformMetaArguments
| *map[string]interface{}
| *No description.* |
+| TerraformResourceType
| *string
| *No description.* |
+| TerraformGeneratorMetadata
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProviderGeneratorMetadata
| *No description.* |
+| Connection
| interface{}
| *No description.* |
+| Count
| *f64
| *No description.* |
+| DependsOn
| *[]*string
| *No description.* |
+| ForEach
| github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator
| *No description.* |
+| Lifecycle
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle
| *No description.* |
+| Provider
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider
| *No description.* |
+| Provisioners
| *[]interface{}
| *No description.* |
+| HmacInput
| interface{}
| *No description.* |
+| IdInput
| *string
| *No description.* |
+| NameInput
| *string
| *No description.* |
+| NamespaceInput
| *string
| *No description.* |
+| Hmac
| interface{}
| *No description.* |
+| Id
| *string
| *No description.* |
+| Name
| *string
| *No description.* |
+| Namespace
| *string
| *No description.* |
+
+---
+
+##### `Node`Required
+
+```go
+func Node() Node
+```
+
+- *Type:* github.com/aws/constructs-go/constructs/v10.Node
+
+The tree node.
+
+---
+
+##### `CdktfStack`Required
+
+```go
+func CdktfStack() TerraformStack
+```
+
+- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformStack
+
+---
+
+##### `Fqn`Required
+
+```go
+func Fqn() *string
+```
+
+- *Type:* *string
+
+---
+
+##### `FriendlyUniqueId`Required
+
+```go
+func FriendlyUniqueId() *string
+```
+
+- *Type:* *string
+
+---
+
+##### `TerraformMetaArguments`Required
+
+```go
+func TerraformMetaArguments() *map[string]interface{}
+```
+
+- *Type:* *map[string]interface{}
+
+---
+
+##### `TerraformResourceType`Required
+
+```go
+func TerraformResourceType() *string
+```
+
+- *Type:* *string
+
+---
+
+##### `TerraformGeneratorMetadata`Optional
+
+```go
+func TerraformGeneratorMetadata() TerraformProviderGeneratorMetadata
+```
+
+- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProviderGeneratorMetadata
+
+---
+
+##### `Connection`Optional
+
+```go
+func Connection() interface{}
+```
+
+- *Type:* interface{}
+
+---
+
+##### `Count`Optional
+
+```go
+func Count() *f64
+```
+
+- *Type:* *f64
+
+---
+
+##### `DependsOn`Optional
+
+```go
+func DependsOn() *[]*string
+```
+
+- *Type:* *[]*string
+
+---
+
+##### `ForEach`Optional
+
+```go
+func ForEach() ITerraformIterator
+```
+
+- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator
+
+---
+
+##### `Lifecycle`Optional
+
+```go
+func Lifecycle() TerraformResourceLifecycle
+```
+
+- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle
+
+---
+
+##### `Provider`Optional
+
+```go
+func Provider() TerraformProvider
+```
+
+- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider
+
+---
+
+##### `Provisioners`Optional
+
+```go
+func Provisioners() *[]interface{}
+```
+
+- *Type:* *[]interface{}
+
+---
+
+##### `HmacInput`Optional
+
+```go
+func HmacInput() interface{}
+```
+
+- *Type:* interface{}
+
+---
+
+##### `IdInput`Optional
+
+```go
+func IdInput() *string
+```
+
+- *Type:* *string
+
+---
+
+##### `NameInput`Optional
+
+```go
+func NameInput() *string
+```
+
+- *Type:* *string
+
+---
+
+##### `NamespaceInput`Optional
+
+```go
+func NamespaceInput() *string
+```
+
+- *Type:* *string
+
+---
+
+##### `Hmac`Required
+
+```go
+func Hmac() interface{}
+```
+
+- *Type:* interface{}
+
+---
+
+##### `Id`Required
+
+```go
+func Id() *string
+```
+
+- *Type:* *string
+
+---
+
+##### `Name`Required
+
+```go
+func Name() *string
+```
+
+- *Type:* *string
+
+---
+
+##### `Namespace`Required
+
+```go
+func Namespace() *string
+```
+
+- *Type:* *string
+
+---
+
+#### Constants
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| TfResourceType
| *string
| *No description.* |
+
+---
+
+##### `TfResourceType`Required
+
+```go
+func TfResourceType() *string
+```
+
+- *Type:* *string
+
+---
+
+## Structs
+
+### AuditRequestHeaderConfig
+
+#### Initializer
+
+```go
+import "github.com/cdktf/cdktf-provider-vault-go/vault/v5/auditrequestheader"
+
+&auditrequestheader.AuditRequestHeaderConfig {
+ Connection: interface{},
+ Count: *f64,
+ DependsOn: *[]github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformDependable,
+ ForEach: github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator,
+ Lifecycle: github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle,
+ Provider: github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider,
+ Provisioners: *[]interface{},
+ Name: *string,
+ Hmac: interface{},
+ Id: *string,
+ Namespace: *string,
+}
+```
+
+#### Properties
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| Connection
| interface{}
| *No description.* |
+| Count
| *f64
| *No description.* |
+| DependsOn
| *[]github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformDependable
| *No description.* |
+| ForEach
| github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator
| *No description.* |
+| Lifecycle
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle
| *No description.* |
+| Provider
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider
| *No description.* |
+| Provisioners
| *[]interface{}
| *No description.* |
+| Name
| *string
| The name of the request header to audit. |
+| Hmac
| interface{}
| Whether this header's value should be HMAC'd in the audit logs. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id}. |
+| Namespace
| *string
| Target namespace. (requires Enterprise). |
+
+---
+
+##### `Connection`Optional
+
+```go
+Connection interface{}
+```
+
+- *Type:* interface{}
+
+---
+
+##### `Count`Optional
+
+```go
+Count *f64
+```
+
+- *Type:* *f64
+
+---
+
+##### `DependsOn`Optional
+
+```go
+DependsOn *[]ITerraformDependable
+```
+
+- *Type:* *[]github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformDependable
+
+---
+
+##### `ForEach`Optional
+
+```go
+ForEach ITerraformIterator
+```
+
+- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator
+
+---
+
+##### `Lifecycle`Optional
+
+```go
+Lifecycle TerraformResourceLifecycle
+```
+
+- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle
+
+---
+
+##### `Provider`Optional
+
+```go
+Provider TerraformProvider
+```
+
+- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider
+
+---
+
+##### `Provisioners`Optional
+
+```go
+Provisioners *[]interface{}
+```
+
+- *Type:* *[]interface{}
+
+---
+
+##### `Name`Required
+
+```go
+Name *string
+```
+
+- *Type:* *string
+
+The name of the request header to audit.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#name AuditRequestHeader#name}
+
+---
+
+##### `Hmac`Optional
+
+```go
+Hmac interface{}
+```
+
+- *Type:* interface{}
+
+Whether this header's value should be HMAC'd in the audit logs.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#hmac AuditRequestHeader#hmac}
+
+---
+
+##### `Id`Optional
+
+```go
+Id *string
+```
+
+- *Type:* *string
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id}.
+
+Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
+If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
+
+---
+
+##### `Namespace`Optional
+
+```go
+Namespace *string
+```
+
+- *Type:* *string
+
+Target namespace. (requires Enterprise).
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#namespace AuditRequestHeader#namespace}
+
+---
+
+
+
diff --git a/docs/auditRequestHeader.java.md b/docs/auditRequestHeader.java.md
new file mode 100644
index 000000000..5036e23f6
--- /dev/null
+++ b/docs/auditRequestHeader.java.md
@@ -0,0 +1,893 @@
+# `auditRequestHeader` Submodule
+
+## Constructs
+
+### AuditRequestHeader
+
+Represents a {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header vault_audit_request_header}.
+
+#### Initializers
+
+```java
+import com.hashicorp.cdktf.providers.vault.audit_request_header.AuditRequestHeader;
+
+AuditRequestHeader.Builder.create(Construct scope, java.lang.String id)
+// .connection(SSHProvisionerConnection)
+// .connection(WinrmProvisionerConnection)
+// .count(java.lang.Number)
+// .dependsOn(java.util.List)
+// .forEach(ITerraformIterator)
+// .lifecycle(TerraformResourceLifecycle)
+// .provider(TerraformProvider)
+// .provisioners(java.util.List)
+ .name(java.lang.String)
+// .hmac(java.lang.Boolean)
+// .hmac(IResolvable)
+// .id(java.lang.String)
+// .namespace(java.lang.String)
+ .build();
+```
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| scope
| software.constructs.Construct
| The scope in which to define this construct. |
+| id
| java.lang.String
| The scoped construct ID. |
+| connection
| com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection
| *No description.* |
+| count
| java.lang.Number
| *No description.* |
+| dependsOn
| java.util.List
| *No description.* |
+| forEach
| com.hashicorp.cdktf.ITerraformIterator
| *No description.* |
+| lifecycle
| com.hashicorp.cdktf.TerraformResourceLifecycle
| *No description.* |
+| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
+| provisioners
| java.util.List
| *No description.* |
+| name
| java.lang.String
| The name of the request header to audit. |
+| hmac
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Whether this header's value should be HMAC'd in the audit logs. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id}. |
+| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
+
+---
+
+##### `scope`Required
+
+- *Type:* software.constructs.Construct
+
+The scope in which to define this construct.
+
+---
+
+##### `id`Required
+
+- *Type:* java.lang.String
+
+The scoped construct ID.
+
+Must be unique amongst siblings in the same scope
+
+---
+
+##### `connection`Optional
+
+- *Type:* com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection
+
+---
+
+##### `count`Optional
+
+- *Type:* java.lang.Number
+
+---
+
+##### `dependsOn`Optional
+
+- *Type:* java.util.List
+
+---
+
+##### `forEach`Optional
+
+- *Type:* com.hashicorp.cdktf.ITerraformIterator
+
+---
+
+##### `lifecycle`Optional
+
+- *Type:* com.hashicorp.cdktf.TerraformResourceLifecycle
+
+---
+
+##### `provider`Optional
+
+- *Type:* com.hashicorp.cdktf.TerraformProvider
+
+---
+
+##### `provisioners`Optional
+
+- *Type:* java.util.List
+
+---
+
+##### `name`Required
+
+- *Type:* java.lang.String
+
+The name of the request header to audit.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#name AuditRequestHeader#name}
+
+---
+
+##### `hmac`Optional
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+Whether this header's value should be HMAC'd in the audit logs.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#hmac AuditRequestHeader#hmac}
+
+---
+
+##### `id`Optional
+
+- *Type:* java.lang.String
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id}.
+
+Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
+If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
+
+---
+
+##### `namespace`Optional
+
+- *Type:* java.lang.String
+
+Target namespace. (requires Enterprise).
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#namespace AuditRequestHeader#namespace}
+
+---
+
+#### Methods
+
+| **Name** | **Description** |
+| --- | --- |
+| toString
| Returns a string representation of this construct. |
+| addOverride
| *No description.* |
+| overrideLogicalId
| Overrides the auto-generated logical ID with a specific ID. |
+| resetOverrideLogicalId
| Resets a previously passed logical Id to use the auto-generated logical id again. |
+| toMetadata
| *No description.* |
+| toTerraform
| Adds this resource to the terraform JSON output. |
+| getAnyMapAttribute
| *No description.* |
+| getBooleanAttribute
| *No description.* |
+| getBooleanMapAttribute
| *No description.* |
+| getListAttribute
| *No description.* |
+| getNumberAttribute
| *No description.* |
+| getNumberListAttribute
| *No description.* |
+| getNumberMapAttribute
| *No description.* |
+| getStringAttribute
| *No description.* |
+| getStringMapAttribute
| *No description.* |
+| interpolationForAttribute
| *No description.* |
+| resetHmac
| *No description.* |
+| resetId
| *No description.* |
+| resetNamespace
| *No description.* |
+
+---
+
+##### `toString`
+
+```java
+public java.lang.String toString()
+```
+
+Returns a string representation of this construct.
+
+##### `addOverride`
+
+```java
+public void addOverride(java.lang.String path, java.lang.Object value)
+```
+
+###### `path`Required
+
+- *Type:* java.lang.String
+
+---
+
+###### `value`Required
+
+- *Type:* java.lang.Object
+
+---
+
+##### `overrideLogicalId`
+
+```java
+public void overrideLogicalId(java.lang.String newLogicalId)
+```
+
+Overrides the auto-generated logical ID with a specific ID.
+
+###### `newLogicalId`Required
+
+- *Type:* java.lang.String
+
+The new logical ID to use for this stack element.
+
+---
+
+##### `resetOverrideLogicalId`
+
+```java
+public void resetOverrideLogicalId()
+```
+
+Resets a previously passed logical Id to use the auto-generated logical id again.
+
+##### `toMetadata`
+
+```java
+public java.lang.Object toMetadata()
+```
+
+##### `toTerraform`
+
+```java
+public java.lang.Object toTerraform()
+```
+
+Adds this resource to the terraform JSON output.
+
+##### `getAnyMapAttribute`
+
+```java
+public java.util.Map getAnyMapAttribute(java.lang.String terraformAttribute)
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* java.lang.String
+
+---
+
+##### `getBooleanAttribute`
+
+```java
+public IResolvable getBooleanAttribute(java.lang.String terraformAttribute)
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* java.lang.String
+
+---
+
+##### `getBooleanMapAttribute`
+
+```java
+public java.util.Map getBooleanMapAttribute(java.lang.String terraformAttribute)
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* java.lang.String
+
+---
+
+##### `getListAttribute`
+
+```java
+public java.util.List getListAttribute(java.lang.String terraformAttribute)
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* java.lang.String
+
+---
+
+##### `getNumberAttribute`
+
+```java
+public java.lang.Number getNumberAttribute(java.lang.String terraformAttribute)
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* java.lang.String
+
+---
+
+##### `getNumberListAttribute`
+
+```java
+public java.util.List getNumberListAttribute(java.lang.String terraformAttribute)
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* java.lang.String
+
+---
+
+##### `getNumberMapAttribute`
+
+```java
+public java.util.Map getNumberMapAttribute(java.lang.String terraformAttribute)
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* java.lang.String
+
+---
+
+##### `getStringAttribute`
+
+```java
+public java.lang.String getStringAttribute(java.lang.String terraformAttribute)
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* java.lang.String
+
+---
+
+##### `getStringMapAttribute`
+
+```java
+public java.util.Map getStringMapAttribute(java.lang.String terraformAttribute)
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* java.lang.String
+
+---
+
+##### `interpolationForAttribute`
+
+```java
+public IResolvable interpolationForAttribute(java.lang.String terraformAttribute)
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* java.lang.String
+
+---
+
+##### `resetHmac`
+
+```java
+public void resetHmac()
+```
+
+##### `resetId`
+
+```java
+public void resetId()
+```
+
+##### `resetNamespace`
+
+```java
+public void resetNamespace()
+```
+
+#### Static Functions
+
+| **Name** | **Description** |
+| --- | --- |
+| isConstruct
| Checks if `x` is a construct. |
+| isTerraformElement
| *No description.* |
+| isTerraformResource
| *No description.* |
+
+---
+
+##### `isConstruct`
+
+```java
+import com.hashicorp.cdktf.providers.vault.audit_request_header.AuditRequestHeader;
+
+AuditRequestHeader.isConstruct(java.lang.Object x)
+```
+
+Checks if `x` is a construct.
+
+Use this method instead of `instanceof` to properly detect `Construct`
+instances, even when the construct library is symlinked.
+
+Explanation: in JavaScript, multiple copies of the `constructs` library on
+disk are seen as independent, completely different libraries. As a
+consequence, the class `Construct` in each copy of the `constructs` library
+is seen as a different class, and an instance of one class will not test as
+`instanceof` the other class. `npm install` will not create installations
+like this, but users may manually symlink construct libraries together or
+use a monorepo tool: in those cases, multiple copies of the `constructs`
+library can be accidentally installed, and `instanceof` will behave
+unpredictably. It is safest to avoid using `instanceof`, and using
+this type-testing method instead.
+
+###### `x`Required
+
+- *Type:* java.lang.Object
+
+Any object.
+
+---
+
+##### `isTerraformElement`
+
+```java
+import com.hashicorp.cdktf.providers.vault.audit_request_header.AuditRequestHeader;
+
+AuditRequestHeader.isTerraformElement(java.lang.Object x)
+```
+
+###### `x`Required
+
+- *Type:* java.lang.Object
+
+---
+
+##### `isTerraformResource`
+
+```java
+import com.hashicorp.cdktf.providers.vault.audit_request_header.AuditRequestHeader;
+
+AuditRequestHeader.isTerraformResource(java.lang.Object x)
+```
+
+###### `x`Required
+
+- *Type:* java.lang.Object
+
+---
+
+#### Properties
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| node
| software.constructs.Node
| The tree node. |
+| cdktfStack
| com.hashicorp.cdktf.TerraformStack
| *No description.* |
+| fqn
| java.lang.String
| *No description.* |
+| friendlyUniqueId
| java.lang.String
| *No description.* |
+| terraformMetaArguments
| java.util.Map
| *No description.* |
+| terraformResourceType
| java.lang.String
| *No description.* |
+| terraformGeneratorMetadata
| com.hashicorp.cdktf.TerraformProviderGeneratorMetadata
| *No description.* |
+| connection
| com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection
| *No description.* |
+| count
| java.lang.Number
| *No description.* |
+| dependsOn
| java.util.List
| *No description.* |
+| forEach
| com.hashicorp.cdktf.ITerraformIterator
| *No description.* |
+| lifecycle
| com.hashicorp.cdktf.TerraformResourceLifecycle
| *No description.* |
+| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
+| provisioners
| java.util.List
| *No description.* |
+| hmacInput
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
+| idInput
| java.lang.String
| *No description.* |
+| nameInput
| java.lang.String
| *No description.* |
+| namespaceInput
| java.lang.String
| *No description.* |
+| hmac
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
+| id
| java.lang.String
| *No description.* |
+| name
| java.lang.String
| *No description.* |
+| namespace
| java.lang.String
| *No description.* |
+
+---
+
+##### `node`Required
+
+```java
+public Node getNode();
+```
+
+- *Type:* software.constructs.Node
+
+The tree node.
+
+---
+
+##### `cdktfStack`Required
+
+```java
+public TerraformStack getCdktfStack();
+```
+
+- *Type:* com.hashicorp.cdktf.TerraformStack
+
+---
+
+##### `fqn`Required
+
+```java
+public java.lang.String getFqn();
+```
+
+- *Type:* java.lang.String
+
+---
+
+##### `friendlyUniqueId`Required
+
+```java
+public java.lang.String getFriendlyUniqueId();
+```
+
+- *Type:* java.lang.String
+
+---
+
+##### `terraformMetaArguments`Required
+
+```java
+public java.util.Map getTerraformMetaArguments();
+```
+
+- *Type:* java.util.Map
+
+---
+
+##### `terraformResourceType`Required
+
+```java
+public java.lang.String getTerraformResourceType();
+```
+
+- *Type:* java.lang.String
+
+---
+
+##### `terraformGeneratorMetadata`Optional
+
+```java
+public TerraformProviderGeneratorMetadata getTerraformGeneratorMetadata();
+```
+
+- *Type:* com.hashicorp.cdktf.TerraformProviderGeneratorMetadata
+
+---
+
+##### `connection`Optional
+
+```java
+public java.lang.Object getConnection();
+```
+
+- *Type:* com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection
+
+---
+
+##### `count`Optional
+
+```java
+public java.lang.Number getCount();
+```
+
+- *Type:* java.lang.Number
+
+---
+
+##### `dependsOn`Optional
+
+```java
+public java.util.List getDependsOn();
+```
+
+- *Type:* java.util.List
+
+---
+
+##### `forEach`Optional
+
+```java
+public ITerraformIterator getForEach();
+```
+
+- *Type:* com.hashicorp.cdktf.ITerraformIterator
+
+---
+
+##### `lifecycle`Optional
+
+```java
+public TerraformResourceLifecycle getLifecycle();
+```
+
+- *Type:* com.hashicorp.cdktf.TerraformResourceLifecycle
+
+---
+
+##### `provider`Optional
+
+```java
+public TerraformProvider getProvider();
+```
+
+- *Type:* com.hashicorp.cdktf.TerraformProvider
+
+---
+
+##### `provisioners`Optional
+
+```java
+public java.lang.Object getProvisioners();
+```
+
+- *Type:* java.util.List
+
+---
+
+##### `hmacInput`Optional
+
+```java
+public java.lang.Object getHmacInput();
+```
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+---
+
+##### `idInput`Optional
+
+```java
+public java.lang.String getIdInput();
+```
+
+- *Type:* java.lang.String
+
+---
+
+##### `nameInput`Optional
+
+```java
+public java.lang.String getNameInput();
+```
+
+- *Type:* java.lang.String
+
+---
+
+##### `namespaceInput`Optional
+
+```java
+public java.lang.String getNamespaceInput();
+```
+
+- *Type:* java.lang.String
+
+---
+
+##### `hmac`Required
+
+```java
+public java.lang.Object getHmac();
+```
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+---
+
+##### `id`Required
+
+```java
+public java.lang.String getId();
+```
+
+- *Type:* java.lang.String
+
+---
+
+##### `name`Required
+
+```java
+public java.lang.String getName();
+```
+
+- *Type:* java.lang.String
+
+---
+
+##### `namespace`Required
+
+```java
+public java.lang.String getNamespace();
+```
+
+- *Type:* java.lang.String
+
+---
+
+#### Constants
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| tfResourceType
| java.lang.String
| *No description.* |
+
+---
+
+##### `tfResourceType`Required
+
+```java
+public java.lang.String getTfResourceType();
+```
+
+- *Type:* java.lang.String
+
+---
+
+## Structs
+
+### AuditRequestHeaderConfig
+
+#### Initializer
+
+```java
+import com.hashicorp.cdktf.providers.vault.audit_request_header.AuditRequestHeaderConfig;
+
+AuditRequestHeaderConfig.builder()
+// .connection(SSHProvisionerConnection)
+// .connection(WinrmProvisionerConnection)
+// .count(java.lang.Number)
+// .dependsOn(java.util.List)
+// .forEach(ITerraformIterator)
+// .lifecycle(TerraformResourceLifecycle)
+// .provider(TerraformProvider)
+// .provisioners(java.util.List)
+ .name(java.lang.String)
+// .hmac(java.lang.Boolean)
+// .hmac(IResolvable)
+// .id(java.lang.String)
+// .namespace(java.lang.String)
+ .build();
+```
+
+#### Properties
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| connection
| com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection
| *No description.* |
+| count
| java.lang.Number
| *No description.* |
+| dependsOn
| java.util.List
| *No description.* |
+| forEach
| com.hashicorp.cdktf.ITerraformIterator
| *No description.* |
+| lifecycle
| com.hashicorp.cdktf.TerraformResourceLifecycle
| *No description.* |
+| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
+| provisioners
| java.util.List
| *No description.* |
+| name
| java.lang.String
| The name of the request header to audit. |
+| hmac
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Whether this header's value should be HMAC'd in the audit logs. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id}. |
+| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
+
+---
+
+##### `connection`Optional
+
+```java
+public java.lang.Object getConnection();
+```
+
+- *Type:* com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection
+
+---
+
+##### `count`Optional
+
+```java
+public java.lang.Number getCount();
+```
+
+- *Type:* java.lang.Number
+
+---
+
+##### `dependsOn`Optional
+
+```java
+public java.util.List getDependsOn();
+```
+
+- *Type:* java.util.List
+
+---
+
+##### `forEach`Optional
+
+```java
+public ITerraformIterator getForEach();
+```
+
+- *Type:* com.hashicorp.cdktf.ITerraformIterator
+
+---
+
+##### `lifecycle`Optional
+
+```java
+public TerraformResourceLifecycle getLifecycle();
+```
+
+- *Type:* com.hashicorp.cdktf.TerraformResourceLifecycle
+
+---
+
+##### `provider`Optional
+
+```java
+public TerraformProvider getProvider();
+```
+
+- *Type:* com.hashicorp.cdktf.TerraformProvider
+
+---
+
+##### `provisioners`Optional
+
+```java
+public java.lang.Object getProvisioners();
+```
+
+- *Type:* java.util.List
+
+---
+
+##### `name`Required
+
+```java
+public java.lang.String getName();
+```
+
+- *Type:* java.lang.String
+
+The name of the request header to audit.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#name AuditRequestHeader#name}
+
+---
+
+##### `hmac`Optional
+
+```java
+public java.lang.Object getHmac();
+```
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+Whether this header's value should be HMAC'd in the audit logs.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#hmac AuditRequestHeader#hmac}
+
+---
+
+##### `id`Optional
+
+```java
+public java.lang.String getId();
+```
+
+- *Type:* java.lang.String
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id}.
+
+Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
+If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
+
+---
+
+##### `namespace`Optional
+
+```java
+public java.lang.String getNamespace();
+```
+
+- *Type:* java.lang.String
+
+Target namespace. (requires Enterprise).
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#namespace AuditRequestHeader#namespace}
+
+---
+
+
+
diff --git a/docs/auditRequestHeader.python.md b/docs/auditRequestHeader.python.md
new file mode 100644
index 000000000..51d8f182a
--- /dev/null
+++ b/docs/auditRequestHeader.python.md
@@ -0,0 +1,918 @@
+# `auditRequestHeader` Submodule
+
+## Constructs
+
+### AuditRequestHeader
+
+Represents a {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header vault_audit_request_header}.
+
+#### Initializers
+
+```python
+from cdktf_cdktf_provider_vault import audit_request_header
+
+auditRequestHeader.AuditRequestHeader(
+ scope: Construct,
+ id: str,
+ connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection] = None,
+ count: typing.Union[int, float] = None,
+ depends_on: typing.List[ITerraformDependable] = None,
+ for_each: ITerraformIterator = None,
+ lifecycle: TerraformResourceLifecycle = None,
+ provider: TerraformProvider = None,
+ provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]] = None,
+ name: str,
+ hmac: typing.Union[bool, IResolvable] = None,
+ id: str = None,
+ namespace: str = None
+)
+```
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| scope
| constructs.Construct
| The scope in which to define this construct. |
+| id
| str
| The scoped construct ID. |
+| connection
| typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection]
| *No description.* |
+| count
| typing.Union[int, float]
| *No description.* |
+| depends_on
| typing.List[cdktf.ITerraformDependable]
| *No description.* |
+| for_each
| cdktf.ITerraformIterator
| *No description.* |
+| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
+| provider
| cdktf.TerraformProvider
| *No description.* |
+| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
+| name
| str
| The name of the request header to audit. |
+| hmac
| typing.Union[bool, cdktf.IResolvable]
| Whether this header's value should be HMAC'd in the audit logs. |
+| id
| str
| Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id}. |
+| namespace
| str
| Target namespace. (requires Enterprise). |
+
+---
+
+##### `scope`Required
+
+- *Type:* constructs.Construct
+
+The scope in which to define this construct.
+
+---
+
+##### `id`Required
+
+- *Type:* str
+
+The scoped construct ID.
+
+Must be unique amongst siblings in the same scope
+
+---
+
+##### `connection`Optional
+
+- *Type:* typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection]
+
+---
+
+##### `count`Optional
+
+- *Type:* typing.Union[int, float]
+
+---
+
+##### `depends_on`Optional
+
+- *Type:* typing.List[cdktf.ITerraformDependable]
+
+---
+
+##### `for_each`Optional
+
+- *Type:* cdktf.ITerraformIterator
+
+---
+
+##### `lifecycle`Optional
+
+- *Type:* cdktf.TerraformResourceLifecycle
+
+---
+
+##### `provider`Optional
+
+- *Type:* cdktf.TerraformProvider
+
+---
+
+##### `provisioners`Optional
+
+- *Type:* typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
+
+---
+
+##### `name`Required
+
+- *Type:* str
+
+The name of the request header to audit.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#name AuditRequestHeader#name}
+
+---
+
+##### `hmac`Optional
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+Whether this header's value should be HMAC'd in the audit logs.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#hmac AuditRequestHeader#hmac}
+
+---
+
+##### `id`Optional
+
+- *Type:* str
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id}.
+
+Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
+If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
+
+---
+
+##### `namespace`Optional
+
+- *Type:* str
+
+Target namespace. (requires Enterprise).
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#namespace AuditRequestHeader#namespace}
+
+---
+
+#### Methods
+
+| **Name** | **Description** |
+| --- | --- |
+| to_string
| Returns a string representation of this construct. |
+| add_override
| *No description.* |
+| override_logical_id
| Overrides the auto-generated logical ID with a specific ID. |
+| reset_override_logical_id
| Resets a previously passed logical Id to use the auto-generated logical id again. |
+| to_metadata
| *No description.* |
+| to_terraform
| Adds this resource to the terraform JSON output. |
+| get_any_map_attribute
| *No description.* |
+| get_boolean_attribute
| *No description.* |
+| get_boolean_map_attribute
| *No description.* |
+| get_list_attribute
| *No description.* |
+| get_number_attribute
| *No description.* |
+| get_number_list_attribute
| *No description.* |
+| get_number_map_attribute
| *No description.* |
+| get_string_attribute
| *No description.* |
+| get_string_map_attribute
| *No description.* |
+| interpolation_for_attribute
| *No description.* |
+| reset_hmac
| *No description.* |
+| reset_id
| *No description.* |
+| reset_namespace
| *No description.* |
+
+---
+
+##### `to_string`
+
+```python
+def to_string() -> str
+```
+
+Returns a string representation of this construct.
+
+##### `add_override`
+
+```python
+def add_override(
+ path: str,
+ value: typing.Any
+) -> None
+```
+
+###### `path`Required
+
+- *Type:* str
+
+---
+
+###### `value`Required
+
+- *Type:* typing.Any
+
+---
+
+##### `override_logical_id`
+
+```python
+def override_logical_id(
+ new_logical_id: str
+) -> None
+```
+
+Overrides the auto-generated logical ID with a specific ID.
+
+###### `new_logical_id`Required
+
+- *Type:* str
+
+The new logical ID to use for this stack element.
+
+---
+
+##### `reset_override_logical_id`
+
+```python
+def reset_override_logical_id() -> None
+```
+
+Resets a previously passed logical Id to use the auto-generated logical id again.
+
+##### `to_metadata`
+
+```python
+def to_metadata() -> typing.Any
+```
+
+##### `to_terraform`
+
+```python
+def to_terraform() -> typing.Any
+```
+
+Adds this resource to the terraform JSON output.
+
+##### `get_any_map_attribute`
+
+```python
+def get_any_map_attribute(
+ terraform_attribute: str
+) -> typing.Mapping[typing.Any]
+```
+
+###### `terraform_attribute`Required
+
+- *Type:* str
+
+---
+
+##### `get_boolean_attribute`
+
+```python
+def get_boolean_attribute(
+ terraform_attribute: str
+) -> IResolvable
+```
+
+###### `terraform_attribute`Required
+
+- *Type:* str
+
+---
+
+##### `get_boolean_map_attribute`
+
+```python
+def get_boolean_map_attribute(
+ terraform_attribute: str
+) -> typing.Mapping[bool]
+```
+
+###### `terraform_attribute`Required
+
+- *Type:* str
+
+---
+
+##### `get_list_attribute`
+
+```python
+def get_list_attribute(
+ terraform_attribute: str
+) -> typing.List[str]
+```
+
+###### `terraform_attribute`Required
+
+- *Type:* str
+
+---
+
+##### `get_number_attribute`
+
+```python
+def get_number_attribute(
+ terraform_attribute: str
+) -> typing.Union[int, float]
+```
+
+###### `terraform_attribute`Required
+
+- *Type:* str
+
+---
+
+##### `get_number_list_attribute`
+
+```python
+def get_number_list_attribute(
+ terraform_attribute: str
+) -> typing.List[typing.Union[int, float]]
+```
+
+###### `terraform_attribute`Required
+
+- *Type:* str
+
+---
+
+##### `get_number_map_attribute`
+
+```python
+def get_number_map_attribute(
+ terraform_attribute: str
+) -> typing.Mapping[typing.Union[int, float]]
+```
+
+###### `terraform_attribute`Required
+
+- *Type:* str
+
+---
+
+##### `get_string_attribute`
+
+```python
+def get_string_attribute(
+ terraform_attribute: str
+) -> str
+```
+
+###### `terraform_attribute`Required
+
+- *Type:* str
+
+---
+
+##### `get_string_map_attribute`
+
+```python
+def get_string_map_attribute(
+ terraform_attribute: str
+) -> typing.Mapping[str]
+```
+
+###### `terraform_attribute`Required
+
+- *Type:* str
+
+---
+
+##### `interpolation_for_attribute`
+
+```python
+def interpolation_for_attribute(
+ terraform_attribute: str
+) -> IResolvable
+```
+
+###### `terraform_attribute`Required
+
+- *Type:* str
+
+---
+
+##### `reset_hmac`
+
+```python
+def reset_hmac() -> None
+```
+
+##### `reset_id`
+
+```python
+def reset_id() -> None
+```
+
+##### `reset_namespace`
+
+```python
+def reset_namespace() -> None
+```
+
+#### Static Functions
+
+| **Name** | **Description** |
+| --- | --- |
+| is_construct
| Checks if `x` is a construct. |
+| is_terraform_element
| *No description.* |
+| is_terraform_resource
| *No description.* |
+
+---
+
+##### `is_construct`
+
+```python
+from cdktf_cdktf_provider_vault import audit_request_header
+
+auditRequestHeader.AuditRequestHeader.is_construct(
+ x: typing.Any
+)
+```
+
+Checks if `x` is a construct.
+
+Use this method instead of `instanceof` to properly detect `Construct`
+instances, even when the construct library is symlinked.
+
+Explanation: in JavaScript, multiple copies of the `constructs` library on
+disk are seen as independent, completely different libraries. As a
+consequence, the class `Construct` in each copy of the `constructs` library
+is seen as a different class, and an instance of one class will not test as
+`instanceof` the other class. `npm install` will not create installations
+like this, but users may manually symlink construct libraries together or
+use a monorepo tool: in those cases, multiple copies of the `constructs`
+library can be accidentally installed, and `instanceof` will behave
+unpredictably. It is safest to avoid using `instanceof`, and using
+this type-testing method instead.
+
+###### `x`Required
+
+- *Type:* typing.Any
+
+Any object.
+
+---
+
+##### `is_terraform_element`
+
+```python
+from cdktf_cdktf_provider_vault import audit_request_header
+
+auditRequestHeader.AuditRequestHeader.is_terraform_element(
+ x: typing.Any
+)
+```
+
+###### `x`Required
+
+- *Type:* typing.Any
+
+---
+
+##### `is_terraform_resource`
+
+```python
+from cdktf_cdktf_provider_vault import audit_request_header
+
+auditRequestHeader.AuditRequestHeader.is_terraform_resource(
+ x: typing.Any
+)
+```
+
+###### `x`Required
+
+- *Type:* typing.Any
+
+---
+
+#### Properties
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| node
| constructs.Node
| The tree node. |
+| cdktf_stack
| cdktf.TerraformStack
| *No description.* |
+| fqn
| str
| *No description.* |
+| friendly_unique_id
| str
| *No description.* |
+| terraform_meta_arguments
| typing.Mapping[typing.Any]
| *No description.* |
+| terraform_resource_type
| str
| *No description.* |
+| terraform_generator_metadata
| cdktf.TerraformProviderGeneratorMetadata
| *No description.* |
+| connection
| typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection]
| *No description.* |
+| count
| typing.Union[int, float]
| *No description.* |
+| depends_on
| typing.List[str]
| *No description.* |
+| for_each
| cdktf.ITerraformIterator
| *No description.* |
+| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
+| provider
| cdktf.TerraformProvider
| *No description.* |
+| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
+| hmac_input
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
+| id_input
| str
| *No description.* |
+| name_input
| str
| *No description.* |
+| namespace_input
| str
| *No description.* |
+| hmac
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
+| id
| str
| *No description.* |
+| name
| str
| *No description.* |
+| namespace
| str
| *No description.* |
+
+---
+
+##### `node`Required
+
+```python
+node: Node
+```
+
+- *Type:* constructs.Node
+
+The tree node.
+
+---
+
+##### `cdktf_stack`Required
+
+```python
+cdktf_stack: TerraformStack
+```
+
+- *Type:* cdktf.TerraformStack
+
+---
+
+##### `fqn`Required
+
+```python
+fqn: str
+```
+
+- *Type:* str
+
+---
+
+##### `friendly_unique_id`Required
+
+```python
+friendly_unique_id: str
+```
+
+- *Type:* str
+
+---
+
+##### `terraform_meta_arguments`Required
+
+```python
+terraform_meta_arguments: typing.Mapping[typing.Any]
+```
+
+- *Type:* typing.Mapping[typing.Any]
+
+---
+
+##### `terraform_resource_type`Required
+
+```python
+terraform_resource_type: str
+```
+
+- *Type:* str
+
+---
+
+##### `terraform_generator_metadata`Optional
+
+```python
+terraform_generator_metadata: TerraformProviderGeneratorMetadata
+```
+
+- *Type:* cdktf.TerraformProviderGeneratorMetadata
+
+---
+
+##### `connection`Optional
+
+```python
+connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection]
+```
+
+- *Type:* typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection]
+
+---
+
+##### `count`Optional
+
+```python
+count: typing.Union[int, float]
+```
+
+- *Type:* typing.Union[int, float]
+
+---
+
+##### `depends_on`Optional
+
+```python
+depends_on: typing.List[str]
+```
+
+- *Type:* typing.List[str]
+
+---
+
+##### `for_each`Optional
+
+```python
+for_each: ITerraformIterator
+```
+
+- *Type:* cdktf.ITerraformIterator
+
+---
+
+##### `lifecycle`Optional
+
+```python
+lifecycle: TerraformResourceLifecycle
+```
+
+- *Type:* cdktf.TerraformResourceLifecycle
+
+---
+
+##### `provider`Optional
+
+```python
+provider: TerraformProvider
+```
+
+- *Type:* cdktf.TerraformProvider
+
+---
+
+##### `provisioners`Optional
+
+```python
+provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]]
+```
+
+- *Type:* typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
+
+---
+
+##### `hmac_input`Optional
+
+```python
+hmac_input: typing.Union[bool, IResolvable]
+```
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+---
+
+##### `id_input`Optional
+
+```python
+id_input: str
+```
+
+- *Type:* str
+
+---
+
+##### `name_input`Optional
+
+```python
+name_input: str
+```
+
+- *Type:* str
+
+---
+
+##### `namespace_input`Optional
+
+```python
+namespace_input: str
+```
+
+- *Type:* str
+
+---
+
+##### `hmac`Required
+
+```python
+hmac: typing.Union[bool, IResolvable]
+```
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+---
+
+##### `id`Required
+
+```python
+id: str
+```
+
+- *Type:* str
+
+---
+
+##### `name`Required
+
+```python
+name: str
+```
+
+- *Type:* str
+
+---
+
+##### `namespace`Required
+
+```python
+namespace: str
+```
+
+- *Type:* str
+
+---
+
+#### Constants
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| tfResourceType
| str
| *No description.* |
+
+---
+
+##### `tfResourceType`Required
+
+```python
+tfResourceType: str
+```
+
+- *Type:* str
+
+---
+
+## Structs
+
+### AuditRequestHeaderConfig
+
+#### Initializer
+
+```python
+from cdktf_cdktf_provider_vault import audit_request_header
+
+auditRequestHeader.AuditRequestHeaderConfig(
+ connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection] = None,
+ count: typing.Union[int, float] = None,
+ depends_on: typing.List[ITerraformDependable] = None,
+ for_each: ITerraformIterator = None,
+ lifecycle: TerraformResourceLifecycle = None,
+ provider: TerraformProvider = None,
+ provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]] = None,
+ name: str,
+ hmac: typing.Union[bool, IResolvable] = None,
+ id: str = None,
+ namespace: str = None
+)
+```
+
+#### Properties
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| connection
| typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection]
| *No description.* |
+| count
| typing.Union[int, float]
| *No description.* |
+| depends_on
| typing.List[cdktf.ITerraformDependable]
| *No description.* |
+| for_each
| cdktf.ITerraformIterator
| *No description.* |
+| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
+| provider
| cdktf.TerraformProvider
| *No description.* |
+| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
+| name
| str
| The name of the request header to audit. |
+| hmac
| typing.Union[bool, cdktf.IResolvable]
| Whether this header's value should be HMAC'd in the audit logs. |
+| id
| str
| Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id}. |
+| namespace
| str
| Target namespace. (requires Enterprise). |
+
+---
+
+##### `connection`Optional
+
+```python
+connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection]
+```
+
+- *Type:* typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection]
+
+---
+
+##### `count`Optional
+
+```python
+count: typing.Union[int, float]
+```
+
+- *Type:* typing.Union[int, float]
+
+---
+
+##### `depends_on`Optional
+
+```python
+depends_on: typing.List[ITerraformDependable]
+```
+
+- *Type:* typing.List[cdktf.ITerraformDependable]
+
+---
+
+##### `for_each`Optional
+
+```python
+for_each: ITerraformIterator
+```
+
+- *Type:* cdktf.ITerraformIterator
+
+---
+
+##### `lifecycle`Optional
+
+```python
+lifecycle: TerraformResourceLifecycle
+```
+
+- *Type:* cdktf.TerraformResourceLifecycle
+
+---
+
+##### `provider`Optional
+
+```python
+provider: TerraformProvider
+```
+
+- *Type:* cdktf.TerraformProvider
+
+---
+
+##### `provisioners`Optional
+
+```python
+provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]]
+```
+
+- *Type:* typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
+
+---
+
+##### `name`Required
+
+```python
+name: str
+```
+
+- *Type:* str
+
+The name of the request header to audit.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#name AuditRequestHeader#name}
+
+---
+
+##### `hmac`Optional
+
+```python
+hmac: typing.Union[bool, IResolvable]
+```
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+Whether this header's value should be HMAC'd in the audit logs.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#hmac AuditRequestHeader#hmac}
+
+---
+
+##### `id`Optional
+
+```python
+id: str
+```
+
+- *Type:* str
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id}.
+
+Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
+If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
+
+---
+
+##### `namespace`Optional
+
+```python
+namespace: str
+```
+
+- *Type:* str
+
+Target namespace. (requires Enterprise).
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#namespace AuditRequestHeader#namespace}
+
+---
+
+
+
diff --git a/docs/auditRequestHeader.typescript.md b/docs/auditRequestHeader.typescript.md
new file mode 100644
index 000000000..6d84e1d38
--- /dev/null
+++ b/docs/auditRequestHeader.typescript.md
@@ -0,0 +1,774 @@
+# `auditRequestHeader` Submodule
+
+## Constructs
+
+### AuditRequestHeader
+
+Represents a {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header vault_audit_request_header}.
+
+#### Initializers
+
+```typescript
+import { auditRequestHeader } from '@cdktf/provider-vault'
+
+new auditRequestHeader.AuditRequestHeader(scope: Construct, id: string, config: AuditRequestHeaderConfig)
+```
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| scope
| constructs.Construct
| The scope in which to define this construct. |
+| id
| string
| The scoped construct ID. |
+| config
| AuditRequestHeaderConfig
| *No description.* |
+
+---
+
+##### `scope`Required
+
+- *Type:* constructs.Construct
+
+The scope in which to define this construct.
+
+---
+
+##### `id`Required
+
+- *Type:* string
+
+The scoped construct ID.
+
+Must be unique amongst siblings in the same scope
+
+---
+
+##### `config`Required
+
+- *Type:* AuditRequestHeaderConfig
+
+---
+
+#### Methods
+
+| **Name** | **Description** |
+| --- | --- |
+| toString
| Returns a string representation of this construct. |
+| addOverride
| *No description.* |
+| overrideLogicalId
| Overrides the auto-generated logical ID with a specific ID. |
+| resetOverrideLogicalId
| Resets a previously passed logical Id to use the auto-generated logical id again. |
+| toMetadata
| *No description.* |
+| toTerraform
| Adds this resource to the terraform JSON output. |
+| getAnyMapAttribute
| *No description.* |
+| getBooleanAttribute
| *No description.* |
+| getBooleanMapAttribute
| *No description.* |
+| getListAttribute
| *No description.* |
+| getNumberAttribute
| *No description.* |
+| getNumberListAttribute
| *No description.* |
+| getNumberMapAttribute
| *No description.* |
+| getStringAttribute
| *No description.* |
+| getStringMapAttribute
| *No description.* |
+| interpolationForAttribute
| *No description.* |
+| resetHmac
| *No description.* |
+| resetId
| *No description.* |
+| resetNamespace
| *No description.* |
+
+---
+
+##### `toString`
+
+```typescript
+public toString(): string
+```
+
+Returns a string representation of this construct.
+
+##### `addOverride`
+
+```typescript
+public addOverride(path: string, value: any): void
+```
+
+###### `path`Required
+
+- *Type:* string
+
+---
+
+###### `value`Required
+
+- *Type:* any
+
+---
+
+##### `overrideLogicalId`
+
+```typescript
+public overrideLogicalId(newLogicalId: string): void
+```
+
+Overrides the auto-generated logical ID with a specific ID.
+
+###### `newLogicalId`Required
+
+- *Type:* string
+
+The new logical ID to use for this stack element.
+
+---
+
+##### `resetOverrideLogicalId`
+
+```typescript
+public resetOverrideLogicalId(): void
+```
+
+Resets a previously passed logical Id to use the auto-generated logical id again.
+
+##### `toMetadata`
+
+```typescript
+public toMetadata(): any
+```
+
+##### `toTerraform`
+
+```typescript
+public toTerraform(): any
+```
+
+Adds this resource to the terraform JSON output.
+
+##### `getAnyMapAttribute`
+
+```typescript
+public getAnyMapAttribute(terraformAttribute: string): {[ key: string ]: any}
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `getBooleanAttribute`
+
+```typescript
+public getBooleanAttribute(terraformAttribute: string): IResolvable
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `getBooleanMapAttribute`
+
+```typescript
+public getBooleanMapAttribute(terraformAttribute: string): {[ key: string ]: boolean}
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `getListAttribute`
+
+```typescript
+public getListAttribute(terraformAttribute: string): string[]
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `getNumberAttribute`
+
+```typescript
+public getNumberAttribute(terraformAttribute: string): number
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `getNumberListAttribute`
+
+```typescript
+public getNumberListAttribute(terraformAttribute: string): number[]
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `getNumberMapAttribute`
+
+```typescript
+public getNumberMapAttribute(terraformAttribute: string): {[ key: string ]: number}
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `getStringAttribute`
+
+```typescript
+public getStringAttribute(terraformAttribute: string): string
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `getStringMapAttribute`
+
+```typescript
+public getStringMapAttribute(terraformAttribute: string): {[ key: string ]: string}
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `interpolationForAttribute`
+
+```typescript
+public interpolationForAttribute(terraformAttribute: string): IResolvable
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `resetHmac`
+
+```typescript
+public resetHmac(): void
+```
+
+##### `resetId`
+
+```typescript
+public resetId(): void
+```
+
+##### `resetNamespace`
+
+```typescript
+public resetNamespace(): void
+```
+
+#### Static Functions
+
+| **Name** | **Description** |
+| --- | --- |
+| isConstruct
| Checks if `x` is a construct. |
+| isTerraformElement
| *No description.* |
+| isTerraformResource
| *No description.* |
+
+---
+
+##### `isConstruct`
+
+```typescript
+import { auditRequestHeader } from '@cdktf/provider-vault'
+
+auditRequestHeader.AuditRequestHeader.isConstruct(x: any)
+```
+
+Checks if `x` is a construct.
+
+Use this method instead of `instanceof` to properly detect `Construct`
+instances, even when the construct library is symlinked.
+
+Explanation: in JavaScript, multiple copies of the `constructs` library on
+disk are seen as independent, completely different libraries. As a
+consequence, the class `Construct` in each copy of the `constructs` library
+is seen as a different class, and an instance of one class will not test as
+`instanceof` the other class. `npm install` will not create installations
+like this, but users may manually symlink construct libraries together or
+use a monorepo tool: in those cases, multiple copies of the `constructs`
+library can be accidentally installed, and `instanceof` will behave
+unpredictably. It is safest to avoid using `instanceof`, and using
+this type-testing method instead.
+
+###### `x`Required
+
+- *Type:* any
+
+Any object.
+
+---
+
+##### `isTerraformElement`
+
+```typescript
+import { auditRequestHeader } from '@cdktf/provider-vault'
+
+auditRequestHeader.AuditRequestHeader.isTerraformElement(x: any)
+```
+
+###### `x`Required
+
+- *Type:* any
+
+---
+
+##### `isTerraformResource`
+
+```typescript
+import { auditRequestHeader } from '@cdktf/provider-vault'
+
+auditRequestHeader.AuditRequestHeader.isTerraformResource(x: any)
+```
+
+###### `x`Required
+
+- *Type:* any
+
+---
+
+#### Properties
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| node
| constructs.Node
| The tree node. |
+| cdktfStack
| cdktf.TerraformStack
| *No description.* |
+| fqn
| string
| *No description.* |
+| friendlyUniqueId
| string
| *No description.* |
+| terraformMetaArguments
| {[ key: string ]: any}
| *No description.* |
+| terraformResourceType
| string
| *No description.* |
+| terraformGeneratorMetadata
| cdktf.TerraformProviderGeneratorMetadata
| *No description.* |
+| connection
| cdktf.SSHProvisionerConnection \| cdktf.WinrmProvisionerConnection
| *No description.* |
+| count
| number
| *No description.* |
+| dependsOn
| string[]
| *No description.* |
+| forEach
| cdktf.ITerraformIterator
| *No description.* |
+| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
+| provider
| cdktf.TerraformProvider
| *No description.* |
+| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
+| hmacInput
| boolean \| cdktf.IResolvable
| *No description.* |
+| idInput
| string
| *No description.* |
+| nameInput
| string
| *No description.* |
+| namespaceInput
| string
| *No description.* |
+| hmac
| boolean \| cdktf.IResolvable
| *No description.* |
+| id
| string
| *No description.* |
+| name
| string
| *No description.* |
+| namespace
| string
| *No description.* |
+
+---
+
+##### `node`Required
+
+```typescript
+public readonly node: Node;
+```
+
+- *Type:* constructs.Node
+
+The tree node.
+
+---
+
+##### `cdktfStack`Required
+
+```typescript
+public readonly cdktfStack: TerraformStack;
+```
+
+- *Type:* cdktf.TerraformStack
+
+---
+
+##### `fqn`Required
+
+```typescript
+public readonly fqn: string;
+```
+
+- *Type:* string
+
+---
+
+##### `friendlyUniqueId`Required
+
+```typescript
+public readonly friendlyUniqueId: string;
+```
+
+- *Type:* string
+
+---
+
+##### `terraformMetaArguments`Required
+
+```typescript
+public readonly terraformMetaArguments: {[ key: string ]: any};
+```
+
+- *Type:* {[ key: string ]: any}
+
+---
+
+##### `terraformResourceType`Required
+
+```typescript
+public readonly terraformResourceType: string;
+```
+
+- *Type:* string
+
+---
+
+##### `terraformGeneratorMetadata`Optional
+
+```typescript
+public readonly terraformGeneratorMetadata: TerraformProviderGeneratorMetadata;
+```
+
+- *Type:* cdktf.TerraformProviderGeneratorMetadata
+
+---
+
+##### `connection`Optional
+
+```typescript
+public readonly connection: SSHProvisionerConnection | WinrmProvisionerConnection;
+```
+
+- *Type:* cdktf.SSHProvisionerConnection | cdktf.WinrmProvisionerConnection
+
+---
+
+##### `count`Optional
+
+```typescript
+public readonly count: number;
+```
+
+- *Type:* number
+
+---
+
+##### `dependsOn`Optional
+
+```typescript
+public readonly dependsOn: string[];
+```
+
+- *Type:* string[]
+
+---
+
+##### `forEach`Optional
+
+```typescript
+public readonly forEach: ITerraformIterator;
+```
+
+- *Type:* cdktf.ITerraformIterator
+
+---
+
+##### `lifecycle`Optional
+
+```typescript
+public readonly lifecycle: TerraformResourceLifecycle;
+```
+
+- *Type:* cdktf.TerraformResourceLifecycle
+
+---
+
+##### `provider`Optional
+
+```typescript
+public readonly provider: TerraformProvider;
+```
+
+- *Type:* cdktf.TerraformProvider
+
+---
+
+##### `provisioners`Optional
+
+```typescript
+public readonly provisioners: FileProvisioner | LocalExecProvisioner | RemoteExecProvisioner[];
+```
+
+- *Type:* cdktf.FileProvisioner | cdktf.LocalExecProvisioner | cdktf.RemoteExecProvisioner[]
+
+---
+
+##### `hmacInput`Optional
+
+```typescript
+public readonly hmacInput: boolean | IResolvable;
+```
+
+- *Type:* boolean | cdktf.IResolvable
+
+---
+
+##### `idInput`Optional
+
+```typescript
+public readonly idInput: string;
+```
+
+- *Type:* string
+
+---
+
+##### `nameInput`Optional
+
+```typescript
+public readonly nameInput: string;
+```
+
+- *Type:* string
+
+---
+
+##### `namespaceInput`Optional
+
+```typescript
+public readonly namespaceInput: string;
+```
+
+- *Type:* string
+
+---
+
+##### `hmac`Required
+
+```typescript
+public readonly hmac: boolean | IResolvable;
+```
+
+- *Type:* boolean | cdktf.IResolvable
+
+---
+
+##### `id`Required
+
+```typescript
+public readonly id: string;
+```
+
+- *Type:* string
+
+---
+
+##### `name`Required
+
+```typescript
+public readonly name: string;
+```
+
+- *Type:* string
+
+---
+
+##### `namespace`Required
+
+```typescript
+public readonly namespace: string;
+```
+
+- *Type:* string
+
+---
+
+#### Constants
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| tfResourceType
| string
| *No description.* |
+
+---
+
+##### `tfResourceType`Required
+
+```typescript
+public readonly tfResourceType: string;
+```
+
+- *Type:* string
+
+---
+
+## Structs
+
+### AuditRequestHeaderConfig
+
+#### Initializer
+
+```typescript
+import { auditRequestHeader } from '@cdktf/provider-vault'
+
+const auditRequestHeaderConfig: auditRequestHeader.AuditRequestHeaderConfig = { ... }
+```
+
+#### Properties
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| connection
| cdktf.SSHProvisionerConnection \| cdktf.WinrmProvisionerConnection
| *No description.* |
+| count
| number
| *No description.* |
+| dependsOn
| cdktf.ITerraformDependable[]
| *No description.* |
+| forEach
| cdktf.ITerraformIterator
| *No description.* |
+| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
+| provider
| cdktf.TerraformProvider
| *No description.* |
+| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
+| name
| string
| The name of the request header to audit. |
+| hmac
| boolean \| cdktf.IResolvable
| Whether this header's value should be HMAC'd in the audit logs. |
+| id
| string
| Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id}. |
+| namespace
| string
| Target namespace. (requires Enterprise). |
+
+---
+
+##### `connection`Optional
+
+```typescript
+public readonly connection: SSHProvisionerConnection | WinrmProvisionerConnection;
+```
+
+- *Type:* cdktf.SSHProvisionerConnection | cdktf.WinrmProvisionerConnection
+
+---
+
+##### `count`Optional
+
+```typescript
+public readonly count: number;
+```
+
+- *Type:* number
+
+---
+
+##### `dependsOn`Optional
+
+```typescript
+public readonly dependsOn: ITerraformDependable[];
+```
+
+- *Type:* cdktf.ITerraformDependable[]
+
+---
+
+##### `forEach`Optional
+
+```typescript
+public readonly forEach: ITerraformIterator;
+```
+
+- *Type:* cdktf.ITerraformIterator
+
+---
+
+##### `lifecycle`Optional
+
+```typescript
+public readonly lifecycle: TerraformResourceLifecycle;
+```
+
+- *Type:* cdktf.TerraformResourceLifecycle
+
+---
+
+##### `provider`Optional
+
+```typescript
+public readonly provider: TerraformProvider;
+```
+
+- *Type:* cdktf.TerraformProvider
+
+---
+
+##### `provisioners`Optional
+
+```typescript
+public readonly provisioners: FileProvisioner | LocalExecProvisioner | RemoteExecProvisioner[];
+```
+
+- *Type:* cdktf.FileProvisioner | cdktf.LocalExecProvisioner | cdktf.RemoteExecProvisioner[]
+
+---
+
+##### `name`Required
+
+```typescript
+public readonly name: string;
+```
+
+- *Type:* string
+
+The name of the request header to audit.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#name AuditRequestHeader#name}
+
+---
+
+##### `hmac`Optional
+
+```typescript
+public readonly hmac: boolean | IResolvable;
+```
+
+- *Type:* boolean | cdktf.IResolvable
+
+Whether this header's value should be HMAC'd in the audit logs.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#hmac AuditRequestHeader#hmac}
+
+---
+
+##### `id`Optional
+
+```typescript
+public readonly id: string;
+```
+
+- *Type:* string
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id}.
+
+Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
+If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
+
+---
+
+##### `namespace`Optional
+
+```typescript
+public readonly namespace: string;
+```
+
+- *Type:* string
+
+Target namespace. (requires Enterprise).
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#namespace AuditRequestHeader#namespace}
+
+---
+
+
+
diff --git a/docs/gcpSecretImpersonatedAccount.csharp.md b/docs/gcpSecretImpersonatedAccount.csharp.md
new file mode 100644
index 000000000..9ba10eebd
--- /dev/null
+++ b/docs/gcpSecretImpersonatedAccount.csharp.md
@@ -0,0 +1,873 @@
+# `gcpSecretImpersonatedAccount` Submodule
+
+## Constructs
+
+### GcpSecretImpersonatedAccount
+
+Represents a {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}.
+
+#### Initializers
+
+```csharp
+using HashiCorp.Cdktf.Providers.Vault;
+
+new GcpSecretImpersonatedAccount(Construct Scope, string Id, GcpSecretImpersonatedAccountConfig Config);
+```
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| Scope
| Constructs.Construct
| The scope in which to define this construct. |
+| Id
| string
| The scoped construct ID. |
+| Config
| GcpSecretImpersonatedAccountConfig
| *No description.* |
+
+---
+
+##### `Scope`Required
+
+- *Type:* Constructs.Construct
+
+The scope in which to define this construct.
+
+---
+
+##### `Id`Required
+
+- *Type:* string
+
+The scoped construct ID.
+
+Must be unique amongst siblings in the same scope
+
+---
+
+##### `Config`Required
+
+- *Type:* GcpSecretImpersonatedAccountConfig
+
+---
+
+#### Methods
+
+| **Name** | **Description** |
+| --- | --- |
+| ToString
| Returns a string representation of this construct. |
+| AddOverride
| *No description.* |
+| OverrideLogicalId
| Overrides the auto-generated logical ID with a specific ID. |
+| ResetOverrideLogicalId
| Resets a previously passed logical Id to use the auto-generated logical id again. |
+| ToMetadata
| *No description.* |
+| ToTerraform
| Adds this resource to the terraform JSON output. |
+| GetAnyMapAttribute
| *No description.* |
+| GetBooleanAttribute
| *No description.* |
+| GetBooleanMapAttribute
| *No description.* |
+| GetListAttribute
| *No description.* |
+| GetNumberAttribute
| *No description.* |
+| GetNumberListAttribute
| *No description.* |
+| GetNumberMapAttribute
| *No description.* |
+| GetStringAttribute
| *No description.* |
+| GetStringMapAttribute
| *No description.* |
+| InterpolationForAttribute
| *No description.* |
+| ResetId
| *No description.* |
+| ResetNamespace
| *No description.* |
+| ResetTokenScopes
| *No description.* |
+
+---
+
+##### `ToString`
+
+```csharp
+private string ToString()
+```
+
+Returns a string representation of this construct.
+
+##### `AddOverride`
+
+```csharp
+private void AddOverride(string Path, object Value)
+```
+
+###### `Path`Required
+
+- *Type:* string
+
+---
+
+###### `Value`Required
+
+- *Type:* object
+
+---
+
+##### `OverrideLogicalId`
+
+```csharp
+private void OverrideLogicalId(string NewLogicalId)
+```
+
+Overrides the auto-generated logical ID with a specific ID.
+
+###### `NewLogicalId`Required
+
+- *Type:* string
+
+The new logical ID to use for this stack element.
+
+---
+
+##### `ResetOverrideLogicalId`
+
+```csharp
+private void ResetOverrideLogicalId()
+```
+
+Resets a previously passed logical Id to use the auto-generated logical id again.
+
+##### `ToMetadata`
+
+```csharp
+private object ToMetadata()
+```
+
+##### `ToTerraform`
+
+```csharp
+private object ToTerraform()
+```
+
+Adds this resource to the terraform JSON output.
+
+##### `GetAnyMapAttribute`
+
+```csharp
+private System.Collections.Generic.IDictionary GetAnyMapAttribute(string TerraformAttribute)
+```
+
+###### `TerraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `GetBooleanAttribute`
+
+```csharp
+private IResolvable GetBooleanAttribute(string TerraformAttribute)
+```
+
+###### `TerraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `GetBooleanMapAttribute`
+
+```csharp
+private System.Collections.Generic.IDictionary GetBooleanMapAttribute(string TerraformAttribute)
+```
+
+###### `TerraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `GetListAttribute`
+
+```csharp
+private string[] GetListAttribute(string TerraformAttribute)
+```
+
+###### `TerraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `GetNumberAttribute`
+
+```csharp
+private double GetNumberAttribute(string TerraformAttribute)
+```
+
+###### `TerraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `GetNumberListAttribute`
+
+```csharp
+private double[] GetNumberListAttribute(string TerraformAttribute)
+```
+
+###### `TerraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `GetNumberMapAttribute`
+
+```csharp
+private System.Collections.Generic.IDictionary GetNumberMapAttribute(string TerraformAttribute)
+```
+
+###### `TerraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `GetStringAttribute`
+
+```csharp
+private string GetStringAttribute(string TerraformAttribute)
+```
+
+###### `TerraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `GetStringMapAttribute`
+
+```csharp
+private System.Collections.Generic.IDictionary GetStringMapAttribute(string TerraformAttribute)
+```
+
+###### `TerraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `InterpolationForAttribute`
+
+```csharp
+private IResolvable InterpolationForAttribute(string TerraformAttribute)
+```
+
+###### `TerraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `ResetId`
+
+```csharp
+private void ResetId()
+```
+
+##### `ResetNamespace`
+
+```csharp
+private void ResetNamespace()
+```
+
+##### `ResetTokenScopes`
+
+```csharp
+private void ResetTokenScopes()
+```
+
+#### Static Functions
+
+| **Name** | **Description** |
+| --- | --- |
+| IsConstruct
| Checks if `x` is a construct. |
+| IsTerraformElement
| *No description.* |
+| IsTerraformResource
| *No description.* |
+
+---
+
+##### `IsConstruct`
+
+```csharp
+using HashiCorp.Cdktf.Providers.Vault;
+
+GcpSecretImpersonatedAccount.IsConstruct(object X);
+```
+
+Checks if `x` is a construct.
+
+Use this method instead of `instanceof` to properly detect `Construct`
+instances, even when the construct library is symlinked.
+
+Explanation: in JavaScript, multiple copies of the `constructs` library on
+disk are seen as independent, completely different libraries. As a
+consequence, the class `Construct` in each copy of the `constructs` library
+is seen as a different class, and an instance of one class will not test as
+`instanceof` the other class. `npm install` will not create installations
+like this, but users may manually symlink construct libraries together or
+use a monorepo tool: in those cases, multiple copies of the `constructs`
+library can be accidentally installed, and `instanceof` will behave
+unpredictably. It is safest to avoid using `instanceof`, and using
+this type-testing method instead.
+
+###### `X`Required
+
+- *Type:* object
+
+Any object.
+
+---
+
+##### `IsTerraformElement`
+
+```csharp
+using HashiCorp.Cdktf.Providers.Vault;
+
+GcpSecretImpersonatedAccount.IsTerraformElement(object X);
+```
+
+###### `X`Required
+
+- *Type:* object
+
+---
+
+##### `IsTerraformResource`
+
+```csharp
+using HashiCorp.Cdktf.Providers.Vault;
+
+GcpSecretImpersonatedAccount.IsTerraformResource(object X);
+```
+
+###### `X`Required
+
+- *Type:* object
+
+---
+
+#### Properties
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| Node
| Constructs.Node
| The tree node. |
+| CdktfStack
| HashiCorp.Cdktf.TerraformStack
| *No description.* |
+| Fqn
| string
| *No description.* |
+| FriendlyUniqueId
| string
| *No description.* |
+| TerraformMetaArguments
| System.Collections.Generic.IDictionary
| *No description.* |
+| TerraformResourceType
| string
| *No description.* |
+| TerraformGeneratorMetadata
| HashiCorp.Cdktf.TerraformProviderGeneratorMetadata
| *No description.* |
+| Connection
| object
| *No description.* |
+| Count
| double
| *No description.* |
+| DependsOn
| string[]
| *No description.* |
+| ForEach
| HashiCorp.Cdktf.ITerraformIterator
| *No description.* |
+| Lifecycle
| HashiCorp.Cdktf.TerraformResourceLifecycle
| *No description.* |
+| Provider
| HashiCorp.Cdktf.TerraformProvider
| *No description.* |
+| Provisioners
| object[]
| *No description.* |
+| ServiceAccountProject
| string
| *No description.* |
+| BackendInput
| string
| *No description.* |
+| IdInput
| string
| *No description.* |
+| ImpersonatedAccountInput
| string
| *No description.* |
+| NamespaceInput
| string
| *No description.* |
+| ServiceAccountEmailInput
| string
| *No description.* |
+| TokenScopesInput
| string[]
| *No description.* |
+| Backend
| string
| *No description.* |
+| Id
| string
| *No description.* |
+| ImpersonatedAccount
| string
| *No description.* |
+| Namespace
| string
| *No description.* |
+| ServiceAccountEmail
| string
| *No description.* |
+| TokenScopes
| string[]
| *No description.* |
+
+---
+
+##### `Node`Required
+
+```csharp
+public Node Node { get; }
+```
+
+- *Type:* Constructs.Node
+
+The tree node.
+
+---
+
+##### `CdktfStack`Required
+
+```csharp
+public TerraformStack CdktfStack { get; }
+```
+
+- *Type:* HashiCorp.Cdktf.TerraformStack
+
+---
+
+##### `Fqn`Required
+
+```csharp
+public string Fqn { get; }
+```
+
+- *Type:* string
+
+---
+
+##### `FriendlyUniqueId`Required
+
+```csharp
+public string FriendlyUniqueId { get; }
+```
+
+- *Type:* string
+
+---
+
+##### `TerraformMetaArguments`Required
+
+```csharp
+public System.Collections.Generic.IDictionary TerraformMetaArguments { get; }
+```
+
+- *Type:* System.Collections.Generic.IDictionary
+
+---
+
+##### `TerraformResourceType`Required
+
+```csharp
+public string TerraformResourceType { get; }
+```
+
+- *Type:* string
+
+---
+
+##### `TerraformGeneratorMetadata`Optional
+
+```csharp
+public TerraformProviderGeneratorMetadata TerraformGeneratorMetadata { get; }
+```
+
+- *Type:* HashiCorp.Cdktf.TerraformProviderGeneratorMetadata
+
+---
+
+##### `Connection`Optional
+
+```csharp
+public object Connection { get; }
+```
+
+- *Type:* object
+
+---
+
+##### `Count`Optional
+
+```csharp
+public double Count { get; }
+```
+
+- *Type:* double
+
+---
+
+##### `DependsOn`Optional
+
+```csharp
+public string[] DependsOn { get; }
+```
+
+- *Type:* string[]
+
+---
+
+##### `ForEach`Optional
+
+```csharp
+public ITerraformIterator ForEach { get; }
+```
+
+- *Type:* HashiCorp.Cdktf.ITerraformIterator
+
+---
+
+##### `Lifecycle`Optional
+
+```csharp
+public TerraformResourceLifecycle Lifecycle { get; }
+```
+
+- *Type:* HashiCorp.Cdktf.TerraformResourceLifecycle
+
+---
+
+##### `Provider`Optional
+
+```csharp
+public TerraformProvider Provider { get; }
+```
+
+- *Type:* HashiCorp.Cdktf.TerraformProvider
+
+---
+
+##### `Provisioners`Optional
+
+```csharp
+public object[] Provisioners { get; }
+```
+
+- *Type:* object[]
+
+---
+
+##### `ServiceAccountProject`Required
+
+```csharp
+public string ServiceAccountProject { get; }
+```
+
+- *Type:* string
+
+---
+
+##### `BackendInput`Optional
+
+```csharp
+public string BackendInput { get; }
+```
+
+- *Type:* string
+
+---
+
+##### `IdInput`Optional
+
+```csharp
+public string IdInput { get; }
+```
+
+- *Type:* string
+
+---
+
+##### `ImpersonatedAccountInput`Optional
+
+```csharp
+public string ImpersonatedAccountInput { get; }
+```
+
+- *Type:* string
+
+---
+
+##### `NamespaceInput`Optional
+
+```csharp
+public string NamespaceInput { get; }
+```
+
+- *Type:* string
+
+---
+
+##### `ServiceAccountEmailInput`Optional
+
+```csharp
+public string ServiceAccountEmailInput { get; }
+```
+
+- *Type:* string
+
+---
+
+##### `TokenScopesInput`Optional
+
+```csharp
+public string[] TokenScopesInput { get; }
+```
+
+- *Type:* string[]
+
+---
+
+##### `Backend`Required
+
+```csharp
+public string Backend { get; }
+```
+
+- *Type:* string
+
+---
+
+##### `Id`Required
+
+```csharp
+public string Id { get; }
+```
+
+- *Type:* string
+
+---
+
+##### `ImpersonatedAccount`Required
+
+```csharp
+public string ImpersonatedAccount { get; }
+```
+
+- *Type:* string
+
+---
+
+##### `Namespace`Required
+
+```csharp
+public string Namespace { get; }
+```
+
+- *Type:* string
+
+---
+
+##### `ServiceAccountEmail`Required
+
+```csharp
+public string ServiceAccountEmail { get; }
+```
+
+- *Type:* string
+
+---
+
+##### `TokenScopes`Required
+
+```csharp
+public string[] TokenScopes { get; }
+```
+
+- *Type:* string[]
+
+---
+
+#### Constants
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| TfResourceType
| string
| *No description.* |
+
+---
+
+##### `TfResourceType`Required
+
+```csharp
+public string TfResourceType { get; }
+```
+
+- *Type:* string
+
+---
+
+## Structs
+
+### GcpSecretImpersonatedAccountConfig
+
+#### Initializer
+
+```csharp
+using HashiCorp.Cdktf.Providers.Vault;
+
+new GcpSecretImpersonatedAccountConfig {
+ object Connection = null,
+ double Count = null,
+ ITerraformDependable[] DependsOn = null,
+ ITerraformIterator ForEach = null,
+ TerraformResourceLifecycle Lifecycle = null,
+ TerraformProvider Provider = null,
+ object[] Provisioners = null,
+ string Backend,
+ string ImpersonatedAccount,
+ string ServiceAccountEmail,
+ string Id = null,
+ string Namespace = null,
+ string[] TokenScopes = null
+};
+```
+
+#### Properties
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| Connection
| object
| *No description.* |
+| Count
| double
| *No description.* |
+| DependsOn
| HashiCorp.Cdktf.ITerraformDependable[]
| *No description.* |
+| ForEach
| HashiCorp.Cdktf.ITerraformIterator
| *No description.* |
+| Lifecycle
| HashiCorp.Cdktf.TerraformResourceLifecycle
| *No description.* |
+| Provider
| HashiCorp.Cdktf.TerraformProvider
| *No description.* |
+| Provisioners
| object[]
| *No description.* |
+| Backend
| string
| Path where the GCP secrets engine is mounted. |
+| ImpersonatedAccount
| string
| Name of the Impersonated Account to create. |
+| ServiceAccountEmail
| string
| Email of the GCP service account. |
+| Id
| string
| Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. |
+| Namespace
| string
| Target namespace. (requires Enterprise). |
+| TokenScopes
| string[]
| List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). |
+
+---
+
+##### `Connection`Optional
+
+```csharp
+public object Connection { get; set; }
+```
+
+- *Type:* object
+
+---
+
+##### `Count`Optional
+
+```csharp
+public double Count { get; set; }
+```
+
+- *Type:* double
+
+---
+
+##### `DependsOn`Optional
+
+```csharp
+public ITerraformDependable[] DependsOn { get; set; }
+```
+
+- *Type:* HashiCorp.Cdktf.ITerraformDependable[]
+
+---
+
+##### `ForEach`Optional
+
+```csharp
+public ITerraformIterator ForEach { get; set; }
+```
+
+- *Type:* HashiCorp.Cdktf.ITerraformIterator
+
+---
+
+##### `Lifecycle`Optional
+
+```csharp
+public TerraformResourceLifecycle Lifecycle { get; set; }
+```
+
+- *Type:* HashiCorp.Cdktf.TerraformResourceLifecycle
+
+---
+
+##### `Provider`Optional
+
+```csharp
+public TerraformProvider Provider { get; set; }
+```
+
+- *Type:* HashiCorp.Cdktf.TerraformProvider
+
+---
+
+##### `Provisioners`Optional
+
+```csharp
+public object[] Provisioners { get; set; }
+```
+
+- *Type:* object[]
+
+---
+
+##### `Backend`Required
+
+```csharp
+public string Backend { get; set; }
+```
+
+- *Type:* string
+
+Path where the GCP secrets engine is mounted.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend}
+
+---
+
+##### `ImpersonatedAccount`Required
+
+```csharp
+public string ImpersonatedAccount { get; set; }
+```
+
+- *Type:* string
+
+Name of the Impersonated Account to create.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account}
+
+---
+
+##### `ServiceAccountEmail`Required
+
+```csharp
+public string ServiceAccountEmail { get; set; }
+```
+
+- *Type:* string
+
+Email of the GCP service account.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email}
+
+---
+
+##### `Id`Optional
+
+```csharp
+public string Id { get; set; }
+```
+
+- *Type:* string
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}.
+
+Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
+If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
+
+---
+
+##### `Namespace`Optional
+
+```csharp
+public string Namespace { get; set; }
+```
+
+- *Type:* string
+
+Target namespace. (requires Enterprise).
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace}
+
+---
+
+##### `TokenScopes`Optional
+
+```csharp
+public string[] TokenScopes { get; set; }
+```
+
+- *Type:* string[]
+
+List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only).
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes}
+
+---
+
+
+
diff --git a/docs/gcpSecretImpersonatedAccount.go.md b/docs/gcpSecretImpersonatedAccount.go.md
new file mode 100644
index 000000000..c2edc536f
--- /dev/null
+++ b/docs/gcpSecretImpersonatedAccount.go.md
@@ -0,0 +1,873 @@
+# `gcpSecretImpersonatedAccount` Submodule
+
+## Constructs
+
+### GcpSecretImpersonatedAccount
+
+Represents a {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}.
+
+#### Initializers
+
+```go
+import "github.com/cdktf/cdktf-provider-vault-go/vault/v5/gcpsecretimpersonatedaccount"
+
+gcpsecretimpersonatedaccount.NewGcpSecretImpersonatedAccount(scope Construct, id *string, config GcpSecretImpersonatedAccountConfig) GcpSecretImpersonatedAccount
+```
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| scope
| github.com/aws/constructs-go/constructs/v10.Construct
| The scope in which to define this construct. |
+| id
| *string
| The scoped construct ID. |
+| config
| GcpSecretImpersonatedAccountConfig
| *No description.* |
+
+---
+
+##### `scope`Required
+
+- *Type:* github.com/aws/constructs-go/constructs/v10.Construct
+
+The scope in which to define this construct.
+
+---
+
+##### `id`Required
+
+- *Type:* *string
+
+The scoped construct ID.
+
+Must be unique amongst siblings in the same scope
+
+---
+
+##### `config`Required
+
+- *Type:* GcpSecretImpersonatedAccountConfig
+
+---
+
+#### Methods
+
+| **Name** | **Description** |
+| --- | --- |
+| ToString
| Returns a string representation of this construct. |
+| AddOverride
| *No description.* |
+| OverrideLogicalId
| Overrides the auto-generated logical ID with a specific ID. |
+| ResetOverrideLogicalId
| Resets a previously passed logical Id to use the auto-generated logical id again. |
+| ToMetadata
| *No description.* |
+| ToTerraform
| Adds this resource to the terraform JSON output. |
+| GetAnyMapAttribute
| *No description.* |
+| GetBooleanAttribute
| *No description.* |
+| GetBooleanMapAttribute
| *No description.* |
+| GetListAttribute
| *No description.* |
+| GetNumberAttribute
| *No description.* |
+| GetNumberListAttribute
| *No description.* |
+| GetNumberMapAttribute
| *No description.* |
+| GetStringAttribute
| *No description.* |
+| GetStringMapAttribute
| *No description.* |
+| InterpolationForAttribute
| *No description.* |
+| ResetId
| *No description.* |
+| ResetNamespace
| *No description.* |
+| ResetTokenScopes
| *No description.* |
+
+---
+
+##### `ToString`
+
+```go
+func ToString() *string
+```
+
+Returns a string representation of this construct.
+
+##### `AddOverride`
+
+```go
+func AddOverride(path *string, value interface{})
+```
+
+###### `path`Required
+
+- *Type:* *string
+
+---
+
+###### `value`Required
+
+- *Type:* interface{}
+
+---
+
+##### `OverrideLogicalId`
+
+```go
+func OverrideLogicalId(newLogicalId *string)
+```
+
+Overrides the auto-generated logical ID with a specific ID.
+
+###### `newLogicalId`Required
+
+- *Type:* *string
+
+The new logical ID to use for this stack element.
+
+---
+
+##### `ResetOverrideLogicalId`
+
+```go
+func ResetOverrideLogicalId()
+```
+
+Resets a previously passed logical Id to use the auto-generated logical id again.
+
+##### `ToMetadata`
+
+```go
+func ToMetadata() interface{}
+```
+
+##### `ToTerraform`
+
+```go
+func ToTerraform() interface{}
+```
+
+Adds this resource to the terraform JSON output.
+
+##### `GetAnyMapAttribute`
+
+```go
+func GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{}
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* *string
+
+---
+
+##### `GetBooleanAttribute`
+
+```go
+func GetBooleanAttribute(terraformAttribute *string) IResolvable
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* *string
+
+---
+
+##### `GetBooleanMapAttribute`
+
+```go
+func GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* *string
+
+---
+
+##### `GetListAttribute`
+
+```go
+func GetListAttribute(terraformAttribute *string) *[]*string
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* *string
+
+---
+
+##### `GetNumberAttribute`
+
+```go
+func GetNumberAttribute(terraformAttribute *string) *f64
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* *string
+
+---
+
+##### `GetNumberListAttribute`
+
+```go
+func GetNumberListAttribute(terraformAttribute *string) *[]*f64
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* *string
+
+---
+
+##### `GetNumberMapAttribute`
+
+```go
+func GetNumberMapAttribute(terraformAttribute *string) *map[string]*f64
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* *string
+
+---
+
+##### `GetStringAttribute`
+
+```go
+func GetStringAttribute(terraformAttribute *string) *string
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* *string
+
+---
+
+##### `GetStringMapAttribute`
+
+```go
+func GetStringMapAttribute(terraformAttribute *string) *map[string]*string
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* *string
+
+---
+
+##### `InterpolationForAttribute`
+
+```go
+func InterpolationForAttribute(terraformAttribute *string) IResolvable
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* *string
+
+---
+
+##### `ResetId`
+
+```go
+func ResetId()
+```
+
+##### `ResetNamespace`
+
+```go
+func ResetNamespace()
+```
+
+##### `ResetTokenScopes`
+
+```go
+func ResetTokenScopes()
+```
+
+#### Static Functions
+
+| **Name** | **Description** |
+| --- | --- |
+| IsConstruct
| Checks if `x` is a construct. |
+| IsTerraformElement
| *No description.* |
+| IsTerraformResource
| *No description.* |
+
+---
+
+##### `IsConstruct`
+
+```go
+import "github.com/cdktf/cdktf-provider-vault-go/vault/v5/gcpsecretimpersonatedaccount"
+
+gcpsecretimpersonatedaccount.GcpSecretImpersonatedAccount_IsConstruct(x interface{}) *bool
+```
+
+Checks if `x` is a construct.
+
+Use this method instead of `instanceof` to properly detect `Construct`
+instances, even when the construct library is symlinked.
+
+Explanation: in JavaScript, multiple copies of the `constructs` library on
+disk are seen as independent, completely different libraries. As a
+consequence, the class `Construct` in each copy of the `constructs` library
+is seen as a different class, and an instance of one class will not test as
+`instanceof` the other class. `npm install` will not create installations
+like this, but users may manually symlink construct libraries together or
+use a monorepo tool: in those cases, multiple copies of the `constructs`
+library can be accidentally installed, and `instanceof` will behave
+unpredictably. It is safest to avoid using `instanceof`, and using
+this type-testing method instead.
+
+###### `x`Required
+
+- *Type:* interface{}
+
+Any object.
+
+---
+
+##### `IsTerraformElement`
+
+```go
+import "github.com/cdktf/cdktf-provider-vault-go/vault/v5/gcpsecretimpersonatedaccount"
+
+gcpsecretimpersonatedaccount.GcpSecretImpersonatedAccount_IsTerraformElement(x interface{}) *bool
+```
+
+###### `x`Required
+
+- *Type:* interface{}
+
+---
+
+##### `IsTerraformResource`
+
+```go
+import "github.com/cdktf/cdktf-provider-vault-go/vault/v5/gcpsecretimpersonatedaccount"
+
+gcpsecretimpersonatedaccount.GcpSecretImpersonatedAccount_IsTerraformResource(x interface{}) *bool
+```
+
+###### `x`Required
+
+- *Type:* interface{}
+
+---
+
+#### Properties
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| Node
| github.com/aws/constructs-go/constructs/v10.Node
| The tree node. |
+| CdktfStack
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformStack
| *No description.* |
+| Fqn
| *string
| *No description.* |
+| FriendlyUniqueId
| *string
| *No description.* |
+| TerraformMetaArguments
| *map[string]interface{}
| *No description.* |
+| TerraformResourceType
| *string
| *No description.* |
+| TerraformGeneratorMetadata
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProviderGeneratorMetadata
| *No description.* |
+| Connection
| interface{}
| *No description.* |
+| Count
| *f64
| *No description.* |
+| DependsOn
| *[]*string
| *No description.* |
+| ForEach
| github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator
| *No description.* |
+| Lifecycle
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle
| *No description.* |
+| Provider
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider
| *No description.* |
+| Provisioners
| *[]interface{}
| *No description.* |
+| ServiceAccountProject
| *string
| *No description.* |
+| BackendInput
| *string
| *No description.* |
+| IdInput
| *string
| *No description.* |
+| ImpersonatedAccountInput
| *string
| *No description.* |
+| NamespaceInput
| *string
| *No description.* |
+| ServiceAccountEmailInput
| *string
| *No description.* |
+| TokenScopesInput
| *[]*string
| *No description.* |
+| Backend
| *string
| *No description.* |
+| Id
| *string
| *No description.* |
+| ImpersonatedAccount
| *string
| *No description.* |
+| Namespace
| *string
| *No description.* |
+| ServiceAccountEmail
| *string
| *No description.* |
+| TokenScopes
| *[]*string
| *No description.* |
+
+---
+
+##### `Node`Required
+
+```go
+func Node() Node
+```
+
+- *Type:* github.com/aws/constructs-go/constructs/v10.Node
+
+The tree node.
+
+---
+
+##### `CdktfStack`Required
+
+```go
+func CdktfStack() TerraformStack
+```
+
+- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformStack
+
+---
+
+##### `Fqn`Required
+
+```go
+func Fqn() *string
+```
+
+- *Type:* *string
+
+---
+
+##### `FriendlyUniqueId`Required
+
+```go
+func FriendlyUniqueId() *string
+```
+
+- *Type:* *string
+
+---
+
+##### `TerraformMetaArguments`Required
+
+```go
+func TerraformMetaArguments() *map[string]interface{}
+```
+
+- *Type:* *map[string]interface{}
+
+---
+
+##### `TerraformResourceType`Required
+
+```go
+func TerraformResourceType() *string
+```
+
+- *Type:* *string
+
+---
+
+##### `TerraformGeneratorMetadata`Optional
+
+```go
+func TerraformGeneratorMetadata() TerraformProviderGeneratorMetadata
+```
+
+- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProviderGeneratorMetadata
+
+---
+
+##### `Connection`Optional
+
+```go
+func Connection() interface{}
+```
+
+- *Type:* interface{}
+
+---
+
+##### `Count`Optional
+
+```go
+func Count() *f64
+```
+
+- *Type:* *f64
+
+---
+
+##### `DependsOn`Optional
+
+```go
+func DependsOn() *[]*string
+```
+
+- *Type:* *[]*string
+
+---
+
+##### `ForEach`Optional
+
+```go
+func ForEach() ITerraformIterator
+```
+
+- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator
+
+---
+
+##### `Lifecycle`Optional
+
+```go
+func Lifecycle() TerraformResourceLifecycle
+```
+
+- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle
+
+---
+
+##### `Provider`Optional
+
+```go
+func Provider() TerraformProvider
+```
+
+- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider
+
+---
+
+##### `Provisioners`Optional
+
+```go
+func Provisioners() *[]interface{}
+```
+
+- *Type:* *[]interface{}
+
+---
+
+##### `ServiceAccountProject`Required
+
+```go
+func ServiceAccountProject() *string
+```
+
+- *Type:* *string
+
+---
+
+##### `BackendInput`Optional
+
+```go
+func BackendInput() *string
+```
+
+- *Type:* *string
+
+---
+
+##### `IdInput`Optional
+
+```go
+func IdInput() *string
+```
+
+- *Type:* *string
+
+---
+
+##### `ImpersonatedAccountInput`Optional
+
+```go
+func ImpersonatedAccountInput() *string
+```
+
+- *Type:* *string
+
+---
+
+##### `NamespaceInput`Optional
+
+```go
+func NamespaceInput() *string
+```
+
+- *Type:* *string
+
+---
+
+##### `ServiceAccountEmailInput`Optional
+
+```go
+func ServiceAccountEmailInput() *string
+```
+
+- *Type:* *string
+
+---
+
+##### `TokenScopesInput`Optional
+
+```go
+func TokenScopesInput() *[]*string
+```
+
+- *Type:* *[]*string
+
+---
+
+##### `Backend`Required
+
+```go
+func Backend() *string
+```
+
+- *Type:* *string
+
+---
+
+##### `Id`Required
+
+```go
+func Id() *string
+```
+
+- *Type:* *string
+
+---
+
+##### `ImpersonatedAccount`Required
+
+```go
+func ImpersonatedAccount() *string
+```
+
+- *Type:* *string
+
+---
+
+##### `Namespace`Required
+
+```go
+func Namespace() *string
+```
+
+- *Type:* *string
+
+---
+
+##### `ServiceAccountEmail`Required
+
+```go
+func ServiceAccountEmail() *string
+```
+
+- *Type:* *string
+
+---
+
+##### `TokenScopes`Required
+
+```go
+func TokenScopes() *[]*string
+```
+
+- *Type:* *[]*string
+
+---
+
+#### Constants
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| TfResourceType
| *string
| *No description.* |
+
+---
+
+##### `TfResourceType`Required
+
+```go
+func TfResourceType() *string
+```
+
+- *Type:* *string
+
+---
+
+## Structs
+
+### GcpSecretImpersonatedAccountConfig
+
+#### Initializer
+
+```go
+import "github.com/cdktf/cdktf-provider-vault-go/vault/v5/gcpsecretimpersonatedaccount"
+
+&gcpsecretimpersonatedaccount.GcpSecretImpersonatedAccountConfig {
+ Connection: interface{},
+ Count: *f64,
+ DependsOn: *[]github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformDependable,
+ ForEach: github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator,
+ Lifecycle: github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle,
+ Provider: github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider,
+ Provisioners: *[]interface{},
+ Backend: *string,
+ ImpersonatedAccount: *string,
+ ServiceAccountEmail: *string,
+ Id: *string,
+ Namespace: *string,
+ TokenScopes: *[]*string,
+}
+```
+
+#### Properties
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| Connection
| interface{}
| *No description.* |
+| Count
| *f64
| *No description.* |
+| DependsOn
| *[]github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformDependable
| *No description.* |
+| ForEach
| github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator
| *No description.* |
+| Lifecycle
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle
| *No description.* |
+| Provider
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider
| *No description.* |
+| Provisioners
| *[]interface{}
| *No description.* |
+| Backend
| *string
| Path where the GCP secrets engine is mounted. |
+| ImpersonatedAccount
| *string
| Name of the Impersonated Account to create. |
+| ServiceAccountEmail
| *string
| Email of the GCP service account. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. |
+| Namespace
| *string
| Target namespace. (requires Enterprise). |
+| TokenScopes
| *[]*string
| List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). |
+
+---
+
+##### `Connection`Optional
+
+```go
+Connection interface{}
+```
+
+- *Type:* interface{}
+
+---
+
+##### `Count`Optional
+
+```go
+Count *f64
+```
+
+- *Type:* *f64
+
+---
+
+##### `DependsOn`Optional
+
+```go
+DependsOn *[]ITerraformDependable
+```
+
+- *Type:* *[]github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformDependable
+
+---
+
+##### `ForEach`Optional
+
+```go
+ForEach ITerraformIterator
+```
+
+- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator
+
+---
+
+##### `Lifecycle`Optional
+
+```go
+Lifecycle TerraformResourceLifecycle
+```
+
+- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle
+
+---
+
+##### `Provider`Optional
+
+```go
+Provider TerraformProvider
+```
+
+- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider
+
+---
+
+##### `Provisioners`Optional
+
+```go
+Provisioners *[]interface{}
+```
+
+- *Type:* *[]interface{}
+
+---
+
+##### `Backend`Required
+
+```go
+Backend *string
+```
+
+- *Type:* *string
+
+Path where the GCP secrets engine is mounted.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend}
+
+---
+
+##### `ImpersonatedAccount`Required
+
+```go
+ImpersonatedAccount *string
+```
+
+- *Type:* *string
+
+Name of the Impersonated Account to create.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account}
+
+---
+
+##### `ServiceAccountEmail`Required
+
+```go
+ServiceAccountEmail *string
+```
+
+- *Type:* *string
+
+Email of the GCP service account.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email}
+
+---
+
+##### `Id`Optional
+
+```go
+Id *string
+```
+
+- *Type:* *string
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}.
+
+Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
+If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
+
+---
+
+##### `Namespace`Optional
+
+```go
+Namespace *string
+```
+
+- *Type:* *string
+
+Target namespace. (requires Enterprise).
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace}
+
+---
+
+##### `TokenScopes`Optional
+
+```go
+TokenScopes *[]*string
+```
+
+- *Type:* *[]*string
+
+List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only).
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes}
+
+---
+
+
+
diff --git a/docs/gcpSecretImpersonatedAccount.java.md b/docs/gcpSecretImpersonatedAccount.java.md
new file mode 100644
index 000000000..9280fffa1
--- /dev/null
+++ b/docs/gcpSecretImpersonatedAccount.java.md
@@ -0,0 +1,1002 @@
+# `gcpSecretImpersonatedAccount` Submodule
+
+## Constructs
+
+### GcpSecretImpersonatedAccount
+
+Represents a {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}.
+
+#### Initializers
+
+```java
+import com.hashicorp.cdktf.providers.vault.gcp_secret_impersonated_account.GcpSecretImpersonatedAccount;
+
+GcpSecretImpersonatedAccount.Builder.create(Construct scope, java.lang.String id)
+// .connection(SSHProvisionerConnection)
+// .connection(WinrmProvisionerConnection)
+// .count(java.lang.Number)
+// .dependsOn(java.util.List)
+// .forEach(ITerraformIterator)
+// .lifecycle(TerraformResourceLifecycle)
+// .provider(TerraformProvider)
+// .provisioners(java.util.List)
+ .backend(java.lang.String)
+ .impersonatedAccount(java.lang.String)
+ .serviceAccountEmail(java.lang.String)
+// .id(java.lang.String)
+// .namespace(java.lang.String)
+// .tokenScopes(java.util.List)
+ .build();
+```
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| scope
| software.constructs.Construct
| The scope in which to define this construct. |
+| id
| java.lang.String
| The scoped construct ID. |
+| connection
| com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection
| *No description.* |
+| count
| java.lang.Number
| *No description.* |
+| dependsOn
| java.util.List
| *No description.* |
+| forEach
| com.hashicorp.cdktf.ITerraformIterator
| *No description.* |
+| lifecycle
| com.hashicorp.cdktf.TerraformResourceLifecycle
| *No description.* |
+| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
+| provisioners
| java.util.List
| *No description.* |
+| backend
| java.lang.String
| Path where the GCP secrets engine is mounted. |
+| impersonatedAccount
| java.lang.String
| Name of the Impersonated Account to create. |
+| serviceAccountEmail
| java.lang.String
| Email of the GCP service account. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. |
+| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
+| tokenScopes
| java.util.List
| List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). |
+
+---
+
+##### `scope`Required
+
+- *Type:* software.constructs.Construct
+
+The scope in which to define this construct.
+
+---
+
+##### `id`Required
+
+- *Type:* java.lang.String
+
+The scoped construct ID.
+
+Must be unique amongst siblings in the same scope
+
+---
+
+##### `connection`Optional
+
+- *Type:* com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection
+
+---
+
+##### `count`Optional
+
+- *Type:* java.lang.Number
+
+---
+
+##### `dependsOn`Optional
+
+- *Type:* java.util.List
+
+---
+
+##### `forEach`Optional
+
+- *Type:* com.hashicorp.cdktf.ITerraformIterator
+
+---
+
+##### `lifecycle`Optional
+
+- *Type:* com.hashicorp.cdktf.TerraformResourceLifecycle
+
+---
+
+##### `provider`Optional
+
+- *Type:* com.hashicorp.cdktf.TerraformProvider
+
+---
+
+##### `provisioners`Optional
+
+- *Type:* java.util.List
+
+---
+
+##### `backend`Required
+
+- *Type:* java.lang.String
+
+Path where the GCP secrets engine is mounted.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend}
+
+---
+
+##### `impersonatedAccount`Required
+
+- *Type:* java.lang.String
+
+Name of the Impersonated Account to create.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account}
+
+---
+
+##### `serviceAccountEmail`Required
+
+- *Type:* java.lang.String
+
+Email of the GCP service account.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email}
+
+---
+
+##### `id`Optional
+
+- *Type:* java.lang.String
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}.
+
+Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
+If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
+
+---
+
+##### `namespace`Optional
+
+- *Type:* java.lang.String
+
+Target namespace. (requires Enterprise).
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace}
+
+---
+
+##### `tokenScopes`Optional
+
+- *Type:* java.util.List
+
+List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only).
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes}
+
+---
+
+#### Methods
+
+| **Name** | **Description** |
+| --- | --- |
+| toString
| Returns a string representation of this construct. |
+| addOverride
| *No description.* |
+| overrideLogicalId
| Overrides the auto-generated logical ID with a specific ID. |
+| resetOverrideLogicalId
| Resets a previously passed logical Id to use the auto-generated logical id again. |
+| toMetadata
| *No description.* |
+| toTerraform
| Adds this resource to the terraform JSON output. |
+| getAnyMapAttribute
| *No description.* |
+| getBooleanAttribute
| *No description.* |
+| getBooleanMapAttribute
| *No description.* |
+| getListAttribute
| *No description.* |
+| getNumberAttribute
| *No description.* |
+| getNumberListAttribute
| *No description.* |
+| getNumberMapAttribute
| *No description.* |
+| getStringAttribute
| *No description.* |
+| getStringMapAttribute
| *No description.* |
+| interpolationForAttribute
| *No description.* |
+| resetId
| *No description.* |
+| resetNamespace
| *No description.* |
+| resetTokenScopes
| *No description.* |
+
+---
+
+##### `toString`
+
+```java
+public java.lang.String toString()
+```
+
+Returns a string representation of this construct.
+
+##### `addOverride`
+
+```java
+public void addOverride(java.lang.String path, java.lang.Object value)
+```
+
+###### `path`Required
+
+- *Type:* java.lang.String
+
+---
+
+###### `value`Required
+
+- *Type:* java.lang.Object
+
+---
+
+##### `overrideLogicalId`
+
+```java
+public void overrideLogicalId(java.lang.String newLogicalId)
+```
+
+Overrides the auto-generated logical ID with a specific ID.
+
+###### `newLogicalId`Required
+
+- *Type:* java.lang.String
+
+The new logical ID to use for this stack element.
+
+---
+
+##### `resetOverrideLogicalId`
+
+```java
+public void resetOverrideLogicalId()
+```
+
+Resets a previously passed logical Id to use the auto-generated logical id again.
+
+##### `toMetadata`
+
+```java
+public java.lang.Object toMetadata()
+```
+
+##### `toTerraform`
+
+```java
+public java.lang.Object toTerraform()
+```
+
+Adds this resource to the terraform JSON output.
+
+##### `getAnyMapAttribute`
+
+```java
+public java.util.Map getAnyMapAttribute(java.lang.String terraformAttribute)
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* java.lang.String
+
+---
+
+##### `getBooleanAttribute`
+
+```java
+public IResolvable getBooleanAttribute(java.lang.String terraformAttribute)
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* java.lang.String
+
+---
+
+##### `getBooleanMapAttribute`
+
+```java
+public java.util.Map getBooleanMapAttribute(java.lang.String terraformAttribute)
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* java.lang.String
+
+---
+
+##### `getListAttribute`
+
+```java
+public java.util.List getListAttribute(java.lang.String terraformAttribute)
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* java.lang.String
+
+---
+
+##### `getNumberAttribute`
+
+```java
+public java.lang.Number getNumberAttribute(java.lang.String terraformAttribute)
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* java.lang.String
+
+---
+
+##### `getNumberListAttribute`
+
+```java
+public java.util.List getNumberListAttribute(java.lang.String terraformAttribute)
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* java.lang.String
+
+---
+
+##### `getNumberMapAttribute`
+
+```java
+public java.util.Map getNumberMapAttribute(java.lang.String terraformAttribute)
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* java.lang.String
+
+---
+
+##### `getStringAttribute`
+
+```java
+public java.lang.String getStringAttribute(java.lang.String terraformAttribute)
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* java.lang.String
+
+---
+
+##### `getStringMapAttribute`
+
+```java
+public java.util.Map getStringMapAttribute(java.lang.String terraformAttribute)
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* java.lang.String
+
+---
+
+##### `interpolationForAttribute`
+
+```java
+public IResolvable interpolationForAttribute(java.lang.String terraformAttribute)
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* java.lang.String
+
+---
+
+##### `resetId`
+
+```java
+public void resetId()
+```
+
+##### `resetNamespace`
+
+```java
+public void resetNamespace()
+```
+
+##### `resetTokenScopes`
+
+```java
+public void resetTokenScopes()
+```
+
+#### Static Functions
+
+| **Name** | **Description** |
+| --- | --- |
+| isConstruct
| Checks if `x` is a construct. |
+| isTerraformElement
| *No description.* |
+| isTerraformResource
| *No description.* |
+
+---
+
+##### `isConstruct`
+
+```java
+import com.hashicorp.cdktf.providers.vault.gcp_secret_impersonated_account.GcpSecretImpersonatedAccount;
+
+GcpSecretImpersonatedAccount.isConstruct(java.lang.Object x)
+```
+
+Checks if `x` is a construct.
+
+Use this method instead of `instanceof` to properly detect `Construct`
+instances, even when the construct library is symlinked.
+
+Explanation: in JavaScript, multiple copies of the `constructs` library on
+disk are seen as independent, completely different libraries. As a
+consequence, the class `Construct` in each copy of the `constructs` library
+is seen as a different class, and an instance of one class will not test as
+`instanceof` the other class. `npm install` will not create installations
+like this, but users may manually symlink construct libraries together or
+use a monorepo tool: in those cases, multiple copies of the `constructs`
+library can be accidentally installed, and `instanceof` will behave
+unpredictably. It is safest to avoid using `instanceof`, and using
+this type-testing method instead.
+
+###### `x`Required
+
+- *Type:* java.lang.Object
+
+Any object.
+
+---
+
+##### `isTerraformElement`
+
+```java
+import com.hashicorp.cdktf.providers.vault.gcp_secret_impersonated_account.GcpSecretImpersonatedAccount;
+
+GcpSecretImpersonatedAccount.isTerraformElement(java.lang.Object x)
+```
+
+###### `x`Required
+
+- *Type:* java.lang.Object
+
+---
+
+##### `isTerraformResource`
+
+```java
+import com.hashicorp.cdktf.providers.vault.gcp_secret_impersonated_account.GcpSecretImpersonatedAccount;
+
+GcpSecretImpersonatedAccount.isTerraformResource(java.lang.Object x)
+```
+
+###### `x`Required
+
+- *Type:* java.lang.Object
+
+---
+
+#### Properties
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| node
| software.constructs.Node
| The tree node. |
+| cdktfStack
| com.hashicorp.cdktf.TerraformStack
| *No description.* |
+| fqn
| java.lang.String
| *No description.* |
+| friendlyUniqueId
| java.lang.String
| *No description.* |
+| terraformMetaArguments
| java.util.Map
| *No description.* |
+| terraformResourceType
| java.lang.String
| *No description.* |
+| terraformGeneratorMetadata
| com.hashicorp.cdktf.TerraformProviderGeneratorMetadata
| *No description.* |
+| connection
| com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection
| *No description.* |
+| count
| java.lang.Number
| *No description.* |
+| dependsOn
| java.util.List
| *No description.* |
+| forEach
| com.hashicorp.cdktf.ITerraformIterator
| *No description.* |
+| lifecycle
| com.hashicorp.cdktf.TerraformResourceLifecycle
| *No description.* |
+| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
+| provisioners
| java.util.List
| *No description.* |
+| serviceAccountProject
| java.lang.String
| *No description.* |
+| backendInput
| java.lang.String
| *No description.* |
+| idInput
| java.lang.String
| *No description.* |
+| impersonatedAccountInput
| java.lang.String
| *No description.* |
+| namespaceInput
| java.lang.String
| *No description.* |
+| serviceAccountEmailInput
| java.lang.String
| *No description.* |
+| tokenScopesInput
| java.util.List
| *No description.* |
+| backend
| java.lang.String
| *No description.* |
+| id
| java.lang.String
| *No description.* |
+| impersonatedAccount
| java.lang.String
| *No description.* |
+| namespace
| java.lang.String
| *No description.* |
+| serviceAccountEmail
| java.lang.String
| *No description.* |
+| tokenScopes
| java.util.List
| *No description.* |
+
+---
+
+##### `node`Required
+
+```java
+public Node getNode();
+```
+
+- *Type:* software.constructs.Node
+
+The tree node.
+
+---
+
+##### `cdktfStack`Required
+
+```java
+public TerraformStack getCdktfStack();
+```
+
+- *Type:* com.hashicorp.cdktf.TerraformStack
+
+---
+
+##### `fqn`Required
+
+```java
+public java.lang.String getFqn();
+```
+
+- *Type:* java.lang.String
+
+---
+
+##### `friendlyUniqueId`Required
+
+```java
+public java.lang.String getFriendlyUniqueId();
+```
+
+- *Type:* java.lang.String
+
+---
+
+##### `terraformMetaArguments`Required
+
+```java
+public java.util.Map getTerraformMetaArguments();
+```
+
+- *Type:* java.util.Map
+
+---
+
+##### `terraformResourceType`Required
+
+```java
+public java.lang.String getTerraformResourceType();
+```
+
+- *Type:* java.lang.String
+
+---
+
+##### `terraformGeneratorMetadata`Optional
+
+```java
+public TerraformProviderGeneratorMetadata getTerraformGeneratorMetadata();
+```
+
+- *Type:* com.hashicorp.cdktf.TerraformProviderGeneratorMetadata
+
+---
+
+##### `connection`Optional
+
+```java
+public java.lang.Object getConnection();
+```
+
+- *Type:* com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection
+
+---
+
+##### `count`Optional
+
+```java
+public java.lang.Number getCount();
+```
+
+- *Type:* java.lang.Number
+
+---
+
+##### `dependsOn`Optional
+
+```java
+public java.util.List getDependsOn();
+```
+
+- *Type:* java.util.List
+
+---
+
+##### `forEach`Optional
+
+```java
+public ITerraformIterator getForEach();
+```
+
+- *Type:* com.hashicorp.cdktf.ITerraformIterator
+
+---
+
+##### `lifecycle`Optional
+
+```java
+public TerraformResourceLifecycle getLifecycle();
+```
+
+- *Type:* com.hashicorp.cdktf.TerraformResourceLifecycle
+
+---
+
+##### `provider`Optional
+
+```java
+public TerraformProvider getProvider();
+```
+
+- *Type:* com.hashicorp.cdktf.TerraformProvider
+
+---
+
+##### `provisioners`Optional
+
+```java
+public java.lang.Object getProvisioners();
+```
+
+- *Type:* java.util.List
+
+---
+
+##### `serviceAccountProject`Required
+
+```java
+public java.lang.String getServiceAccountProject();
+```
+
+- *Type:* java.lang.String
+
+---
+
+##### `backendInput`Optional
+
+```java
+public java.lang.String getBackendInput();
+```
+
+- *Type:* java.lang.String
+
+---
+
+##### `idInput`Optional
+
+```java
+public java.lang.String getIdInput();
+```
+
+- *Type:* java.lang.String
+
+---
+
+##### `impersonatedAccountInput`Optional
+
+```java
+public java.lang.String getImpersonatedAccountInput();
+```
+
+- *Type:* java.lang.String
+
+---
+
+##### `namespaceInput`Optional
+
+```java
+public java.lang.String getNamespaceInput();
+```
+
+- *Type:* java.lang.String
+
+---
+
+##### `serviceAccountEmailInput`Optional
+
+```java
+public java.lang.String getServiceAccountEmailInput();
+```
+
+- *Type:* java.lang.String
+
+---
+
+##### `tokenScopesInput`Optional
+
+```java
+public java.util.List getTokenScopesInput();
+```
+
+- *Type:* java.util.List
+
+---
+
+##### `backend`Required
+
+```java
+public java.lang.String getBackend();
+```
+
+- *Type:* java.lang.String
+
+---
+
+##### `id`Required
+
+```java
+public java.lang.String getId();
+```
+
+- *Type:* java.lang.String
+
+---
+
+##### `impersonatedAccount`Required
+
+```java
+public java.lang.String getImpersonatedAccount();
+```
+
+- *Type:* java.lang.String
+
+---
+
+##### `namespace`Required
+
+```java
+public java.lang.String getNamespace();
+```
+
+- *Type:* java.lang.String
+
+---
+
+##### `serviceAccountEmail`Required
+
+```java
+public java.lang.String getServiceAccountEmail();
+```
+
+- *Type:* java.lang.String
+
+---
+
+##### `tokenScopes`Required
+
+```java
+public java.util.List getTokenScopes();
+```
+
+- *Type:* java.util.List
+
+---
+
+#### Constants
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| tfResourceType
| java.lang.String
| *No description.* |
+
+---
+
+##### `tfResourceType`Required
+
+```java
+public java.lang.String getTfResourceType();
+```
+
+- *Type:* java.lang.String
+
+---
+
+## Structs
+
+### GcpSecretImpersonatedAccountConfig
+
+#### Initializer
+
+```java
+import com.hashicorp.cdktf.providers.vault.gcp_secret_impersonated_account.GcpSecretImpersonatedAccountConfig;
+
+GcpSecretImpersonatedAccountConfig.builder()
+// .connection(SSHProvisionerConnection)
+// .connection(WinrmProvisionerConnection)
+// .count(java.lang.Number)
+// .dependsOn(java.util.List)
+// .forEach(ITerraformIterator)
+// .lifecycle(TerraformResourceLifecycle)
+// .provider(TerraformProvider)
+// .provisioners(java.util.List)
+ .backend(java.lang.String)
+ .impersonatedAccount(java.lang.String)
+ .serviceAccountEmail(java.lang.String)
+// .id(java.lang.String)
+// .namespace(java.lang.String)
+// .tokenScopes(java.util.List)
+ .build();
+```
+
+#### Properties
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| connection
| com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection
| *No description.* |
+| count
| java.lang.Number
| *No description.* |
+| dependsOn
| java.util.List
| *No description.* |
+| forEach
| com.hashicorp.cdktf.ITerraformIterator
| *No description.* |
+| lifecycle
| com.hashicorp.cdktf.TerraformResourceLifecycle
| *No description.* |
+| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
+| provisioners
| java.util.List
| *No description.* |
+| backend
| java.lang.String
| Path where the GCP secrets engine is mounted. |
+| impersonatedAccount
| java.lang.String
| Name of the Impersonated Account to create. |
+| serviceAccountEmail
| java.lang.String
| Email of the GCP service account. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. |
+| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
+| tokenScopes
| java.util.List
| List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). |
+
+---
+
+##### `connection`Optional
+
+```java
+public java.lang.Object getConnection();
+```
+
+- *Type:* com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection
+
+---
+
+##### `count`Optional
+
+```java
+public java.lang.Number getCount();
+```
+
+- *Type:* java.lang.Number
+
+---
+
+##### `dependsOn`Optional
+
+```java
+public java.util.List getDependsOn();
+```
+
+- *Type:* java.util.List
+
+---
+
+##### `forEach`Optional
+
+```java
+public ITerraformIterator getForEach();
+```
+
+- *Type:* com.hashicorp.cdktf.ITerraformIterator
+
+---
+
+##### `lifecycle`Optional
+
+```java
+public TerraformResourceLifecycle getLifecycle();
+```
+
+- *Type:* com.hashicorp.cdktf.TerraformResourceLifecycle
+
+---
+
+##### `provider`Optional
+
+```java
+public TerraformProvider getProvider();
+```
+
+- *Type:* com.hashicorp.cdktf.TerraformProvider
+
+---
+
+##### `provisioners`Optional
+
+```java
+public java.lang.Object getProvisioners();
+```
+
+- *Type:* java.util.List
+
+---
+
+##### `backend`Required
+
+```java
+public java.lang.String getBackend();
+```
+
+- *Type:* java.lang.String
+
+Path where the GCP secrets engine is mounted.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend}
+
+---
+
+##### `impersonatedAccount`Required
+
+```java
+public java.lang.String getImpersonatedAccount();
+```
+
+- *Type:* java.lang.String
+
+Name of the Impersonated Account to create.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account}
+
+---
+
+##### `serviceAccountEmail`Required
+
+```java
+public java.lang.String getServiceAccountEmail();
+```
+
+- *Type:* java.lang.String
+
+Email of the GCP service account.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email}
+
+---
+
+##### `id`Optional
+
+```java
+public java.lang.String getId();
+```
+
+- *Type:* java.lang.String
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}.
+
+Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
+If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
+
+---
+
+##### `namespace`Optional
+
+```java
+public java.lang.String getNamespace();
+```
+
+- *Type:* java.lang.String
+
+Target namespace. (requires Enterprise).
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace}
+
+---
+
+##### `tokenScopes`Optional
+
+```java
+public java.util.List getTokenScopes();
+```
+
+- *Type:* java.util.List
+
+List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only).
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes}
+
+---
+
+
+
diff --git a/docs/gcpSecretImpersonatedAccount.python.md b/docs/gcpSecretImpersonatedAccount.python.md
new file mode 100644
index 000000000..ce539197c
--- /dev/null
+++ b/docs/gcpSecretImpersonatedAccount.python.md
@@ -0,0 +1,1029 @@
+# `gcpSecretImpersonatedAccount` Submodule
+
+## Constructs
+
+### GcpSecretImpersonatedAccount
+
+Represents a {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}.
+
+#### Initializers
+
+```python
+from cdktf_cdktf_provider_vault import gcp_secret_impersonated_account
+
+gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccount(
+ scope: Construct,
+ id: str,
+ connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection] = None,
+ count: typing.Union[int, float] = None,
+ depends_on: typing.List[ITerraformDependable] = None,
+ for_each: ITerraformIterator = None,
+ lifecycle: TerraformResourceLifecycle = None,
+ provider: TerraformProvider = None,
+ provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]] = None,
+ backend: str,
+ impersonated_account: str,
+ service_account_email: str,
+ id: str = None,
+ namespace: str = None,
+ token_scopes: typing.List[str] = None
+)
+```
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| scope
| constructs.Construct
| The scope in which to define this construct. |
+| id
| str
| The scoped construct ID. |
+| connection
| typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection]
| *No description.* |
+| count
| typing.Union[int, float]
| *No description.* |
+| depends_on
| typing.List[cdktf.ITerraformDependable]
| *No description.* |
+| for_each
| cdktf.ITerraformIterator
| *No description.* |
+| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
+| provider
| cdktf.TerraformProvider
| *No description.* |
+| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
+| backend
| str
| Path where the GCP secrets engine is mounted. |
+| impersonated_account
| str
| Name of the Impersonated Account to create. |
+| service_account_email
| str
| Email of the GCP service account. |
+| id
| str
| Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. |
+| namespace
| str
| Target namespace. (requires Enterprise). |
+| token_scopes
| typing.List[str]
| List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). |
+
+---
+
+##### `scope`Required
+
+- *Type:* constructs.Construct
+
+The scope in which to define this construct.
+
+---
+
+##### `id`Required
+
+- *Type:* str
+
+The scoped construct ID.
+
+Must be unique amongst siblings in the same scope
+
+---
+
+##### `connection`Optional
+
+- *Type:* typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection]
+
+---
+
+##### `count`Optional
+
+- *Type:* typing.Union[int, float]
+
+---
+
+##### `depends_on`Optional
+
+- *Type:* typing.List[cdktf.ITerraformDependable]
+
+---
+
+##### `for_each`Optional
+
+- *Type:* cdktf.ITerraformIterator
+
+---
+
+##### `lifecycle`Optional
+
+- *Type:* cdktf.TerraformResourceLifecycle
+
+---
+
+##### `provider`Optional
+
+- *Type:* cdktf.TerraformProvider
+
+---
+
+##### `provisioners`Optional
+
+- *Type:* typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
+
+---
+
+##### `backend`Required
+
+- *Type:* str
+
+Path where the GCP secrets engine is mounted.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend}
+
+---
+
+##### `impersonated_account`Required
+
+- *Type:* str
+
+Name of the Impersonated Account to create.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account}
+
+---
+
+##### `service_account_email`Required
+
+- *Type:* str
+
+Email of the GCP service account.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email}
+
+---
+
+##### `id`Optional
+
+- *Type:* str
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}.
+
+Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
+If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
+
+---
+
+##### `namespace`Optional
+
+- *Type:* str
+
+Target namespace. (requires Enterprise).
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace}
+
+---
+
+##### `token_scopes`Optional
+
+- *Type:* typing.List[str]
+
+List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only).
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes}
+
+---
+
+#### Methods
+
+| **Name** | **Description** |
+| --- | --- |
+| to_string
| Returns a string representation of this construct. |
+| add_override
| *No description.* |
+| override_logical_id
| Overrides the auto-generated logical ID with a specific ID. |
+| reset_override_logical_id
| Resets a previously passed logical Id to use the auto-generated logical id again. |
+| to_metadata
| *No description.* |
+| to_terraform
| Adds this resource to the terraform JSON output. |
+| get_any_map_attribute
| *No description.* |
+| get_boolean_attribute
| *No description.* |
+| get_boolean_map_attribute
| *No description.* |
+| get_list_attribute
| *No description.* |
+| get_number_attribute
| *No description.* |
+| get_number_list_attribute
| *No description.* |
+| get_number_map_attribute
| *No description.* |
+| get_string_attribute
| *No description.* |
+| get_string_map_attribute
| *No description.* |
+| interpolation_for_attribute
| *No description.* |
+| reset_id
| *No description.* |
+| reset_namespace
| *No description.* |
+| reset_token_scopes
| *No description.* |
+
+---
+
+##### `to_string`
+
+```python
+def to_string() -> str
+```
+
+Returns a string representation of this construct.
+
+##### `add_override`
+
+```python
+def add_override(
+ path: str,
+ value: typing.Any
+) -> None
+```
+
+###### `path`Required
+
+- *Type:* str
+
+---
+
+###### `value`Required
+
+- *Type:* typing.Any
+
+---
+
+##### `override_logical_id`
+
+```python
+def override_logical_id(
+ new_logical_id: str
+) -> None
+```
+
+Overrides the auto-generated logical ID with a specific ID.
+
+###### `new_logical_id`Required
+
+- *Type:* str
+
+The new logical ID to use for this stack element.
+
+---
+
+##### `reset_override_logical_id`
+
+```python
+def reset_override_logical_id() -> None
+```
+
+Resets a previously passed logical Id to use the auto-generated logical id again.
+
+##### `to_metadata`
+
+```python
+def to_metadata() -> typing.Any
+```
+
+##### `to_terraform`
+
+```python
+def to_terraform() -> typing.Any
+```
+
+Adds this resource to the terraform JSON output.
+
+##### `get_any_map_attribute`
+
+```python
+def get_any_map_attribute(
+ terraform_attribute: str
+) -> typing.Mapping[typing.Any]
+```
+
+###### `terraform_attribute`Required
+
+- *Type:* str
+
+---
+
+##### `get_boolean_attribute`
+
+```python
+def get_boolean_attribute(
+ terraform_attribute: str
+) -> IResolvable
+```
+
+###### `terraform_attribute`Required
+
+- *Type:* str
+
+---
+
+##### `get_boolean_map_attribute`
+
+```python
+def get_boolean_map_attribute(
+ terraform_attribute: str
+) -> typing.Mapping[bool]
+```
+
+###### `terraform_attribute`Required
+
+- *Type:* str
+
+---
+
+##### `get_list_attribute`
+
+```python
+def get_list_attribute(
+ terraform_attribute: str
+) -> typing.List[str]
+```
+
+###### `terraform_attribute`Required
+
+- *Type:* str
+
+---
+
+##### `get_number_attribute`
+
+```python
+def get_number_attribute(
+ terraform_attribute: str
+) -> typing.Union[int, float]
+```
+
+###### `terraform_attribute`Required
+
+- *Type:* str
+
+---
+
+##### `get_number_list_attribute`
+
+```python
+def get_number_list_attribute(
+ terraform_attribute: str
+) -> typing.List[typing.Union[int, float]]
+```
+
+###### `terraform_attribute`Required
+
+- *Type:* str
+
+---
+
+##### `get_number_map_attribute`
+
+```python
+def get_number_map_attribute(
+ terraform_attribute: str
+) -> typing.Mapping[typing.Union[int, float]]
+```
+
+###### `terraform_attribute`Required
+
+- *Type:* str
+
+---
+
+##### `get_string_attribute`
+
+```python
+def get_string_attribute(
+ terraform_attribute: str
+) -> str
+```
+
+###### `terraform_attribute`Required
+
+- *Type:* str
+
+---
+
+##### `get_string_map_attribute`
+
+```python
+def get_string_map_attribute(
+ terraform_attribute: str
+) -> typing.Mapping[str]
+```
+
+###### `terraform_attribute`Required
+
+- *Type:* str
+
+---
+
+##### `interpolation_for_attribute`
+
+```python
+def interpolation_for_attribute(
+ terraform_attribute: str
+) -> IResolvable
+```
+
+###### `terraform_attribute`Required
+
+- *Type:* str
+
+---
+
+##### `reset_id`
+
+```python
+def reset_id() -> None
+```
+
+##### `reset_namespace`
+
+```python
+def reset_namespace() -> None
+```
+
+##### `reset_token_scopes`
+
+```python
+def reset_token_scopes() -> None
+```
+
+#### Static Functions
+
+| **Name** | **Description** |
+| --- | --- |
+| is_construct
| Checks if `x` is a construct. |
+| is_terraform_element
| *No description.* |
+| is_terraform_resource
| *No description.* |
+
+---
+
+##### `is_construct`
+
+```python
+from cdktf_cdktf_provider_vault import gcp_secret_impersonated_account
+
+gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccount.is_construct(
+ x: typing.Any
+)
+```
+
+Checks if `x` is a construct.
+
+Use this method instead of `instanceof` to properly detect `Construct`
+instances, even when the construct library is symlinked.
+
+Explanation: in JavaScript, multiple copies of the `constructs` library on
+disk are seen as independent, completely different libraries. As a
+consequence, the class `Construct` in each copy of the `constructs` library
+is seen as a different class, and an instance of one class will not test as
+`instanceof` the other class. `npm install` will not create installations
+like this, but users may manually symlink construct libraries together or
+use a monorepo tool: in those cases, multiple copies of the `constructs`
+library can be accidentally installed, and `instanceof` will behave
+unpredictably. It is safest to avoid using `instanceof`, and using
+this type-testing method instead.
+
+###### `x`Required
+
+- *Type:* typing.Any
+
+Any object.
+
+---
+
+##### `is_terraform_element`
+
+```python
+from cdktf_cdktf_provider_vault import gcp_secret_impersonated_account
+
+gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccount.is_terraform_element(
+ x: typing.Any
+)
+```
+
+###### `x`Required
+
+- *Type:* typing.Any
+
+---
+
+##### `is_terraform_resource`
+
+```python
+from cdktf_cdktf_provider_vault import gcp_secret_impersonated_account
+
+gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccount.is_terraform_resource(
+ x: typing.Any
+)
+```
+
+###### `x`Required
+
+- *Type:* typing.Any
+
+---
+
+#### Properties
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| node
| constructs.Node
| The tree node. |
+| cdktf_stack
| cdktf.TerraformStack
| *No description.* |
+| fqn
| str
| *No description.* |
+| friendly_unique_id
| str
| *No description.* |
+| terraform_meta_arguments
| typing.Mapping[typing.Any]
| *No description.* |
+| terraform_resource_type
| str
| *No description.* |
+| terraform_generator_metadata
| cdktf.TerraformProviderGeneratorMetadata
| *No description.* |
+| connection
| typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection]
| *No description.* |
+| count
| typing.Union[int, float]
| *No description.* |
+| depends_on
| typing.List[str]
| *No description.* |
+| for_each
| cdktf.ITerraformIterator
| *No description.* |
+| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
+| provider
| cdktf.TerraformProvider
| *No description.* |
+| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
+| service_account_project
| str
| *No description.* |
+| backend_input
| str
| *No description.* |
+| id_input
| str
| *No description.* |
+| impersonated_account_input
| str
| *No description.* |
+| namespace_input
| str
| *No description.* |
+| service_account_email_input
| str
| *No description.* |
+| token_scopes_input
| typing.List[str]
| *No description.* |
+| backend
| str
| *No description.* |
+| id
| str
| *No description.* |
+| impersonated_account
| str
| *No description.* |
+| namespace
| str
| *No description.* |
+| service_account_email
| str
| *No description.* |
+| token_scopes
| typing.List[str]
| *No description.* |
+
+---
+
+##### `node`Required
+
+```python
+node: Node
+```
+
+- *Type:* constructs.Node
+
+The tree node.
+
+---
+
+##### `cdktf_stack`Required
+
+```python
+cdktf_stack: TerraformStack
+```
+
+- *Type:* cdktf.TerraformStack
+
+---
+
+##### `fqn`Required
+
+```python
+fqn: str
+```
+
+- *Type:* str
+
+---
+
+##### `friendly_unique_id`Required
+
+```python
+friendly_unique_id: str
+```
+
+- *Type:* str
+
+---
+
+##### `terraform_meta_arguments`Required
+
+```python
+terraform_meta_arguments: typing.Mapping[typing.Any]
+```
+
+- *Type:* typing.Mapping[typing.Any]
+
+---
+
+##### `terraform_resource_type`Required
+
+```python
+terraform_resource_type: str
+```
+
+- *Type:* str
+
+---
+
+##### `terraform_generator_metadata`Optional
+
+```python
+terraform_generator_metadata: TerraformProviderGeneratorMetadata
+```
+
+- *Type:* cdktf.TerraformProviderGeneratorMetadata
+
+---
+
+##### `connection`Optional
+
+```python
+connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection]
+```
+
+- *Type:* typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection]
+
+---
+
+##### `count`Optional
+
+```python
+count: typing.Union[int, float]
+```
+
+- *Type:* typing.Union[int, float]
+
+---
+
+##### `depends_on`Optional
+
+```python
+depends_on: typing.List[str]
+```
+
+- *Type:* typing.List[str]
+
+---
+
+##### `for_each`Optional
+
+```python
+for_each: ITerraformIterator
+```
+
+- *Type:* cdktf.ITerraformIterator
+
+---
+
+##### `lifecycle`Optional
+
+```python
+lifecycle: TerraformResourceLifecycle
+```
+
+- *Type:* cdktf.TerraformResourceLifecycle
+
+---
+
+##### `provider`Optional
+
+```python
+provider: TerraformProvider
+```
+
+- *Type:* cdktf.TerraformProvider
+
+---
+
+##### `provisioners`Optional
+
+```python
+provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]]
+```
+
+- *Type:* typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
+
+---
+
+##### `service_account_project`Required
+
+```python
+service_account_project: str
+```
+
+- *Type:* str
+
+---
+
+##### `backend_input`Optional
+
+```python
+backend_input: str
+```
+
+- *Type:* str
+
+---
+
+##### `id_input`Optional
+
+```python
+id_input: str
+```
+
+- *Type:* str
+
+---
+
+##### `impersonated_account_input`Optional
+
+```python
+impersonated_account_input: str
+```
+
+- *Type:* str
+
+---
+
+##### `namespace_input`Optional
+
+```python
+namespace_input: str
+```
+
+- *Type:* str
+
+---
+
+##### `service_account_email_input`Optional
+
+```python
+service_account_email_input: str
+```
+
+- *Type:* str
+
+---
+
+##### `token_scopes_input`Optional
+
+```python
+token_scopes_input: typing.List[str]
+```
+
+- *Type:* typing.List[str]
+
+---
+
+##### `backend`Required
+
+```python
+backend: str
+```
+
+- *Type:* str
+
+---
+
+##### `id`Required
+
+```python
+id: str
+```
+
+- *Type:* str
+
+---
+
+##### `impersonated_account`Required
+
+```python
+impersonated_account: str
+```
+
+- *Type:* str
+
+---
+
+##### `namespace`Required
+
+```python
+namespace: str
+```
+
+- *Type:* str
+
+---
+
+##### `service_account_email`Required
+
+```python
+service_account_email: str
+```
+
+- *Type:* str
+
+---
+
+##### `token_scopes`Required
+
+```python
+token_scopes: typing.List[str]
+```
+
+- *Type:* typing.List[str]
+
+---
+
+#### Constants
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| tfResourceType
| str
| *No description.* |
+
+---
+
+##### `tfResourceType`Required
+
+```python
+tfResourceType: str
+```
+
+- *Type:* str
+
+---
+
+## Structs
+
+### GcpSecretImpersonatedAccountConfig
+
+#### Initializer
+
+```python
+from cdktf_cdktf_provider_vault import gcp_secret_impersonated_account
+
+gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccountConfig(
+ connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection] = None,
+ count: typing.Union[int, float] = None,
+ depends_on: typing.List[ITerraformDependable] = None,
+ for_each: ITerraformIterator = None,
+ lifecycle: TerraformResourceLifecycle = None,
+ provider: TerraformProvider = None,
+ provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]] = None,
+ backend: str,
+ impersonated_account: str,
+ service_account_email: str,
+ id: str = None,
+ namespace: str = None,
+ token_scopes: typing.List[str] = None
+)
+```
+
+#### Properties
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| connection
| typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection]
| *No description.* |
+| count
| typing.Union[int, float]
| *No description.* |
+| depends_on
| typing.List[cdktf.ITerraformDependable]
| *No description.* |
+| for_each
| cdktf.ITerraformIterator
| *No description.* |
+| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
+| provider
| cdktf.TerraformProvider
| *No description.* |
+| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
+| backend
| str
| Path where the GCP secrets engine is mounted. |
+| impersonated_account
| str
| Name of the Impersonated Account to create. |
+| service_account_email
| str
| Email of the GCP service account. |
+| id
| str
| Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. |
+| namespace
| str
| Target namespace. (requires Enterprise). |
+| token_scopes
| typing.List[str]
| List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). |
+
+---
+
+##### `connection`Optional
+
+```python
+connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection]
+```
+
+- *Type:* typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection]
+
+---
+
+##### `count`Optional
+
+```python
+count: typing.Union[int, float]
+```
+
+- *Type:* typing.Union[int, float]
+
+---
+
+##### `depends_on`Optional
+
+```python
+depends_on: typing.List[ITerraformDependable]
+```
+
+- *Type:* typing.List[cdktf.ITerraformDependable]
+
+---
+
+##### `for_each`Optional
+
+```python
+for_each: ITerraformIterator
+```
+
+- *Type:* cdktf.ITerraformIterator
+
+---
+
+##### `lifecycle`Optional
+
+```python
+lifecycle: TerraformResourceLifecycle
+```
+
+- *Type:* cdktf.TerraformResourceLifecycle
+
+---
+
+##### `provider`Optional
+
+```python
+provider: TerraformProvider
+```
+
+- *Type:* cdktf.TerraformProvider
+
+---
+
+##### `provisioners`Optional
+
+```python
+provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]]
+```
+
+- *Type:* typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
+
+---
+
+##### `backend`Required
+
+```python
+backend: str
+```
+
+- *Type:* str
+
+Path where the GCP secrets engine is mounted.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend}
+
+---
+
+##### `impersonated_account`Required
+
+```python
+impersonated_account: str
+```
+
+- *Type:* str
+
+Name of the Impersonated Account to create.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account}
+
+---
+
+##### `service_account_email`Required
+
+```python
+service_account_email: str
+```
+
+- *Type:* str
+
+Email of the GCP service account.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email}
+
+---
+
+##### `id`Optional
+
+```python
+id: str
+```
+
+- *Type:* str
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}.
+
+Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
+If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
+
+---
+
+##### `namespace`Optional
+
+```python
+namespace: str
+```
+
+- *Type:* str
+
+Target namespace. (requires Enterprise).
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace}
+
+---
+
+##### `token_scopes`Optional
+
+```python
+token_scopes: typing.List[str]
+```
+
+- *Type:* typing.List[str]
+
+List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only).
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes}
+
+---
+
+
+
diff --git a/docs/gcpSecretImpersonatedAccount.typescript.md b/docs/gcpSecretImpersonatedAccount.typescript.md
new file mode 100644
index 000000000..efdbe01ba
--- /dev/null
+++ b/docs/gcpSecretImpersonatedAccount.typescript.md
@@ -0,0 +1,859 @@
+# `gcpSecretImpersonatedAccount` Submodule
+
+## Constructs
+
+### GcpSecretImpersonatedAccount
+
+Represents a {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}.
+
+#### Initializers
+
+```typescript
+import { gcpSecretImpersonatedAccount } from '@cdktf/provider-vault'
+
+new gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccount(scope: Construct, id: string, config: GcpSecretImpersonatedAccountConfig)
+```
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| scope
| constructs.Construct
| The scope in which to define this construct. |
+| id
| string
| The scoped construct ID. |
+| config
| GcpSecretImpersonatedAccountConfig
| *No description.* |
+
+---
+
+##### `scope`Required
+
+- *Type:* constructs.Construct
+
+The scope in which to define this construct.
+
+---
+
+##### `id`Required
+
+- *Type:* string
+
+The scoped construct ID.
+
+Must be unique amongst siblings in the same scope
+
+---
+
+##### `config`Required
+
+- *Type:* GcpSecretImpersonatedAccountConfig
+
+---
+
+#### Methods
+
+| **Name** | **Description** |
+| --- | --- |
+| toString
| Returns a string representation of this construct. |
+| addOverride
| *No description.* |
+| overrideLogicalId
| Overrides the auto-generated logical ID with a specific ID. |
+| resetOverrideLogicalId
| Resets a previously passed logical Id to use the auto-generated logical id again. |
+| toMetadata
| *No description.* |
+| toTerraform
| Adds this resource to the terraform JSON output. |
+| getAnyMapAttribute
| *No description.* |
+| getBooleanAttribute
| *No description.* |
+| getBooleanMapAttribute
| *No description.* |
+| getListAttribute
| *No description.* |
+| getNumberAttribute
| *No description.* |
+| getNumberListAttribute
| *No description.* |
+| getNumberMapAttribute
| *No description.* |
+| getStringAttribute
| *No description.* |
+| getStringMapAttribute
| *No description.* |
+| interpolationForAttribute
| *No description.* |
+| resetId
| *No description.* |
+| resetNamespace
| *No description.* |
+| resetTokenScopes
| *No description.* |
+
+---
+
+##### `toString`
+
+```typescript
+public toString(): string
+```
+
+Returns a string representation of this construct.
+
+##### `addOverride`
+
+```typescript
+public addOverride(path: string, value: any): void
+```
+
+###### `path`Required
+
+- *Type:* string
+
+---
+
+###### `value`Required
+
+- *Type:* any
+
+---
+
+##### `overrideLogicalId`
+
+```typescript
+public overrideLogicalId(newLogicalId: string): void
+```
+
+Overrides the auto-generated logical ID with a specific ID.
+
+###### `newLogicalId`Required
+
+- *Type:* string
+
+The new logical ID to use for this stack element.
+
+---
+
+##### `resetOverrideLogicalId`
+
+```typescript
+public resetOverrideLogicalId(): void
+```
+
+Resets a previously passed logical Id to use the auto-generated logical id again.
+
+##### `toMetadata`
+
+```typescript
+public toMetadata(): any
+```
+
+##### `toTerraform`
+
+```typescript
+public toTerraform(): any
+```
+
+Adds this resource to the terraform JSON output.
+
+##### `getAnyMapAttribute`
+
+```typescript
+public getAnyMapAttribute(terraformAttribute: string): {[ key: string ]: any}
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `getBooleanAttribute`
+
+```typescript
+public getBooleanAttribute(terraformAttribute: string): IResolvable
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `getBooleanMapAttribute`
+
+```typescript
+public getBooleanMapAttribute(terraformAttribute: string): {[ key: string ]: boolean}
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `getListAttribute`
+
+```typescript
+public getListAttribute(terraformAttribute: string): string[]
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `getNumberAttribute`
+
+```typescript
+public getNumberAttribute(terraformAttribute: string): number
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `getNumberListAttribute`
+
+```typescript
+public getNumberListAttribute(terraformAttribute: string): number[]
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `getNumberMapAttribute`
+
+```typescript
+public getNumberMapAttribute(terraformAttribute: string): {[ key: string ]: number}
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `getStringAttribute`
+
+```typescript
+public getStringAttribute(terraformAttribute: string): string
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `getStringMapAttribute`
+
+```typescript
+public getStringMapAttribute(terraformAttribute: string): {[ key: string ]: string}
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `interpolationForAttribute`
+
+```typescript
+public interpolationForAttribute(terraformAttribute: string): IResolvable
+```
+
+###### `terraformAttribute`Required
+
+- *Type:* string
+
+---
+
+##### `resetId`
+
+```typescript
+public resetId(): void
+```
+
+##### `resetNamespace`
+
+```typescript
+public resetNamespace(): void
+```
+
+##### `resetTokenScopes`
+
+```typescript
+public resetTokenScopes(): void
+```
+
+#### Static Functions
+
+| **Name** | **Description** |
+| --- | --- |
+| isConstruct
| Checks if `x` is a construct. |
+| isTerraformElement
| *No description.* |
+| isTerraformResource
| *No description.* |
+
+---
+
+##### `isConstruct`
+
+```typescript
+import { gcpSecretImpersonatedAccount } from '@cdktf/provider-vault'
+
+gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccount.isConstruct(x: any)
+```
+
+Checks if `x` is a construct.
+
+Use this method instead of `instanceof` to properly detect `Construct`
+instances, even when the construct library is symlinked.
+
+Explanation: in JavaScript, multiple copies of the `constructs` library on
+disk are seen as independent, completely different libraries. As a
+consequence, the class `Construct` in each copy of the `constructs` library
+is seen as a different class, and an instance of one class will not test as
+`instanceof` the other class. `npm install` will not create installations
+like this, but users may manually symlink construct libraries together or
+use a monorepo tool: in those cases, multiple copies of the `constructs`
+library can be accidentally installed, and `instanceof` will behave
+unpredictably. It is safest to avoid using `instanceof`, and using
+this type-testing method instead.
+
+###### `x`Required
+
+- *Type:* any
+
+Any object.
+
+---
+
+##### `isTerraformElement`
+
+```typescript
+import { gcpSecretImpersonatedAccount } from '@cdktf/provider-vault'
+
+gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccount.isTerraformElement(x: any)
+```
+
+###### `x`Required
+
+- *Type:* any
+
+---
+
+##### `isTerraformResource`
+
+```typescript
+import { gcpSecretImpersonatedAccount } from '@cdktf/provider-vault'
+
+gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccount.isTerraformResource(x: any)
+```
+
+###### `x`Required
+
+- *Type:* any
+
+---
+
+#### Properties
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| node
| constructs.Node
| The tree node. |
+| cdktfStack
| cdktf.TerraformStack
| *No description.* |
+| fqn
| string
| *No description.* |
+| friendlyUniqueId
| string
| *No description.* |
+| terraformMetaArguments
| {[ key: string ]: any}
| *No description.* |
+| terraformResourceType
| string
| *No description.* |
+| terraformGeneratorMetadata
| cdktf.TerraformProviderGeneratorMetadata
| *No description.* |
+| connection
| cdktf.SSHProvisionerConnection \| cdktf.WinrmProvisionerConnection
| *No description.* |
+| count
| number
| *No description.* |
+| dependsOn
| string[]
| *No description.* |
+| forEach
| cdktf.ITerraformIterator
| *No description.* |
+| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
+| provider
| cdktf.TerraformProvider
| *No description.* |
+| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
+| serviceAccountProject
| string
| *No description.* |
+| backendInput
| string
| *No description.* |
+| idInput
| string
| *No description.* |
+| impersonatedAccountInput
| string
| *No description.* |
+| namespaceInput
| string
| *No description.* |
+| serviceAccountEmailInput
| string
| *No description.* |
+| tokenScopesInput
| string[]
| *No description.* |
+| backend
| string
| *No description.* |
+| id
| string
| *No description.* |
+| impersonatedAccount
| string
| *No description.* |
+| namespace
| string
| *No description.* |
+| serviceAccountEmail
| string
| *No description.* |
+| tokenScopes
| string[]
| *No description.* |
+
+---
+
+##### `node`Required
+
+```typescript
+public readonly node: Node;
+```
+
+- *Type:* constructs.Node
+
+The tree node.
+
+---
+
+##### `cdktfStack`Required
+
+```typescript
+public readonly cdktfStack: TerraformStack;
+```
+
+- *Type:* cdktf.TerraformStack
+
+---
+
+##### `fqn`Required
+
+```typescript
+public readonly fqn: string;
+```
+
+- *Type:* string
+
+---
+
+##### `friendlyUniqueId`Required
+
+```typescript
+public readonly friendlyUniqueId: string;
+```
+
+- *Type:* string
+
+---
+
+##### `terraformMetaArguments`Required
+
+```typescript
+public readonly terraformMetaArguments: {[ key: string ]: any};
+```
+
+- *Type:* {[ key: string ]: any}
+
+---
+
+##### `terraformResourceType`Required
+
+```typescript
+public readonly terraformResourceType: string;
+```
+
+- *Type:* string
+
+---
+
+##### `terraformGeneratorMetadata`Optional
+
+```typescript
+public readonly terraformGeneratorMetadata: TerraformProviderGeneratorMetadata;
+```
+
+- *Type:* cdktf.TerraformProviderGeneratorMetadata
+
+---
+
+##### `connection`Optional
+
+```typescript
+public readonly connection: SSHProvisionerConnection | WinrmProvisionerConnection;
+```
+
+- *Type:* cdktf.SSHProvisionerConnection | cdktf.WinrmProvisionerConnection
+
+---
+
+##### `count`Optional
+
+```typescript
+public readonly count: number;
+```
+
+- *Type:* number
+
+---
+
+##### `dependsOn`Optional
+
+```typescript
+public readonly dependsOn: string[];
+```
+
+- *Type:* string[]
+
+---
+
+##### `forEach`Optional
+
+```typescript
+public readonly forEach: ITerraformIterator;
+```
+
+- *Type:* cdktf.ITerraformIterator
+
+---
+
+##### `lifecycle`Optional
+
+```typescript
+public readonly lifecycle: TerraformResourceLifecycle;
+```
+
+- *Type:* cdktf.TerraformResourceLifecycle
+
+---
+
+##### `provider`Optional
+
+```typescript
+public readonly provider: TerraformProvider;
+```
+
+- *Type:* cdktf.TerraformProvider
+
+---
+
+##### `provisioners`Optional
+
+```typescript
+public readonly provisioners: FileProvisioner | LocalExecProvisioner | RemoteExecProvisioner[];
+```
+
+- *Type:* cdktf.FileProvisioner | cdktf.LocalExecProvisioner | cdktf.RemoteExecProvisioner[]
+
+---
+
+##### `serviceAccountProject`Required
+
+```typescript
+public readonly serviceAccountProject: string;
+```
+
+- *Type:* string
+
+---
+
+##### `backendInput`Optional
+
+```typescript
+public readonly backendInput: string;
+```
+
+- *Type:* string
+
+---
+
+##### `idInput`Optional
+
+```typescript
+public readonly idInput: string;
+```
+
+- *Type:* string
+
+---
+
+##### `impersonatedAccountInput`Optional
+
+```typescript
+public readonly impersonatedAccountInput: string;
+```
+
+- *Type:* string
+
+---
+
+##### `namespaceInput`Optional
+
+```typescript
+public readonly namespaceInput: string;
+```
+
+- *Type:* string
+
+---
+
+##### `serviceAccountEmailInput`Optional
+
+```typescript
+public readonly serviceAccountEmailInput: string;
+```
+
+- *Type:* string
+
+---
+
+##### `tokenScopesInput`Optional
+
+```typescript
+public readonly tokenScopesInput: string[];
+```
+
+- *Type:* string[]
+
+---
+
+##### `backend`Required
+
+```typescript
+public readonly backend: string;
+```
+
+- *Type:* string
+
+---
+
+##### `id`Required
+
+```typescript
+public readonly id: string;
+```
+
+- *Type:* string
+
+---
+
+##### `impersonatedAccount`Required
+
+```typescript
+public readonly impersonatedAccount: string;
+```
+
+- *Type:* string
+
+---
+
+##### `namespace`Required
+
+```typescript
+public readonly namespace: string;
+```
+
+- *Type:* string
+
+---
+
+##### `serviceAccountEmail`Required
+
+```typescript
+public readonly serviceAccountEmail: string;
+```
+
+- *Type:* string
+
+---
+
+##### `tokenScopes`Required
+
+```typescript
+public readonly tokenScopes: string[];
+```
+
+- *Type:* string[]
+
+---
+
+#### Constants
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| tfResourceType
| string
| *No description.* |
+
+---
+
+##### `tfResourceType`Required
+
+```typescript
+public readonly tfResourceType: string;
+```
+
+- *Type:* string
+
+---
+
+## Structs
+
+### GcpSecretImpersonatedAccountConfig
+
+#### Initializer
+
+```typescript
+import { gcpSecretImpersonatedAccount } from '@cdktf/provider-vault'
+
+const gcpSecretImpersonatedAccountConfig: gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccountConfig = { ... }
+```
+
+#### Properties
+
+| **Name** | **Type** | **Description** |
+| --- | --- | --- |
+| connection
| cdktf.SSHProvisionerConnection \| cdktf.WinrmProvisionerConnection
| *No description.* |
+| count
| number
| *No description.* |
+| dependsOn
| cdktf.ITerraformDependable[]
| *No description.* |
+| forEach
| cdktf.ITerraformIterator
| *No description.* |
+| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
+| provider
| cdktf.TerraformProvider
| *No description.* |
+| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
+| backend
| string
| Path where the GCP secrets engine is mounted. |
+| impersonatedAccount
| string
| Name of the Impersonated Account to create. |
+| serviceAccountEmail
| string
| Email of the GCP service account. |
+| id
| string
| Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. |
+| namespace
| string
| Target namespace. (requires Enterprise). |
+| tokenScopes
| string[]
| List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). |
+
+---
+
+##### `connection`Optional
+
+```typescript
+public readonly connection: SSHProvisionerConnection | WinrmProvisionerConnection;
+```
+
+- *Type:* cdktf.SSHProvisionerConnection | cdktf.WinrmProvisionerConnection
+
+---
+
+##### `count`Optional
+
+```typescript
+public readonly count: number;
+```
+
+- *Type:* number
+
+---
+
+##### `dependsOn`Optional
+
+```typescript
+public readonly dependsOn: ITerraformDependable[];
+```
+
+- *Type:* cdktf.ITerraformDependable[]
+
+---
+
+##### `forEach`Optional
+
+```typescript
+public readonly forEach: ITerraformIterator;
+```
+
+- *Type:* cdktf.ITerraformIterator
+
+---
+
+##### `lifecycle`Optional
+
+```typescript
+public readonly lifecycle: TerraformResourceLifecycle;
+```
+
+- *Type:* cdktf.TerraformResourceLifecycle
+
+---
+
+##### `provider`Optional
+
+```typescript
+public readonly provider: TerraformProvider;
+```
+
+- *Type:* cdktf.TerraformProvider
+
+---
+
+##### `provisioners`Optional
+
+```typescript
+public readonly provisioners: FileProvisioner | LocalExecProvisioner | RemoteExecProvisioner[];
+```
+
+- *Type:* cdktf.FileProvisioner | cdktf.LocalExecProvisioner | cdktf.RemoteExecProvisioner[]
+
+---
+
+##### `backend`Required
+
+```typescript
+public readonly backend: string;
+```
+
+- *Type:* string
+
+Path where the GCP secrets engine is mounted.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend}
+
+---
+
+##### `impersonatedAccount`Required
+
+```typescript
+public readonly impersonatedAccount: string;
+```
+
+- *Type:* string
+
+Name of the Impersonated Account to create.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account}
+
+---
+
+##### `serviceAccountEmail`Required
+
+```typescript
+public readonly serviceAccountEmail: string;
+```
+
+- *Type:* string
+
+Email of the GCP service account.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email}
+
+---
+
+##### `id`Optional
+
+```typescript
+public readonly id: string;
+```
+
+- *Type:* string
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}.
+
+Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
+If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
+
+---
+
+##### `namespace`Optional
+
+```typescript
+public readonly namespace: string;
+```
+
+- *Type:* string
+
+Target namespace. (requires Enterprise).
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace}
+
+---
+
+##### `tokenScopes`Optional
+
+```typescript
+public readonly tokenScopes: string[];
+```
+
+- *Type:* string[]
+
+List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only).
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes}
+
+---
+
+
+
diff --git a/docs/pkiSecretBackendCrlConfig.csharp.md b/docs/pkiSecretBackendCrlConfig.csharp.md
index 016c7d15f..da6704caf 100644
--- a/docs/pkiSecretBackendCrlConfig.csharp.md
+++ b/docs/pkiSecretBackendCrlConfig.csharp.md
@@ -68,6 +68,7 @@ Must be unique amongst siblings in the same scope
| InterpolationForAttribute
| *No description.* |
| ResetAutoRebuild
| *No description.* |
| ResetAutoRebuildGracePeriod
| *No description.* |
+| ResetCrossClusterRevocation
| *No description.* |
| ResetDeltaRebuildInterval
| *No description.* |
| ResetDisable
| *No description.* |
| ResetEnableDelta
| *No description.* |
@@ -76,6 +77,8 @@ Must be unique amongst siblings in the same scope
| ResetNamespace
| *No description.* |
| ResetOcspDisable
| *No description.* |
| ResetOcspExpiry
| *No description.* |
+| ResetUnifiedCrl
| *No description.* |
+| ResetUnifiedCrlOnExistingPaths
| *No description.* |
---
@@ -275,6 +278,12 @@ private void ResetAutoRebuild()
private void ResetAutoRebuildGracePeriod()
```
+##### `ResetCrossClusterRevocation`
+
+```csharp
+private void ResetCrossClusterRevocation()
+```
+
##### `ResetDeltaRebuildInterval`
```csharp
@@ -323,6 +332,18 @@ private void ResetOcspDisable()
private void ResetOcspExpiry()
```
+##### `ResetUnifiedCrl`
+
+```csharp
+private void ResetUnifiedCrl()
+```
+
+##### `ResetUnifiedCrlOnExistingPaths`
+
+```csharp
+private void ResetUnifiedCrlOnExistingPaths()
+```
+
#### Static Functions
| **Name** | **Description** |
@@ -414,6 +435,7 @@ PkiSecretBackendCrlConfig.IsTerraformResource(object X);
| AutoRebuildGracePeriodInput
| string
| *No description.* |
| AutoRebuildInput
| object
| *No description.* |
| BackendInput
| string
| *No description.* |
+| CrossClusterRevocationInput
| object
| *No description.* |
| DeltaRebuildIntervalInput
| string
| *No description.* |
| DisableInput
| object
| *No description.* |
| EnableDeltaInput
| object
| *No description.* |
@@ -422,9 +444,12 @@ PkiSecretBackendCrlConfig.IsTerraformResource(object X);
| NamespaceInput
| string
| *No description.* |
| OcspDisableInput
| object
| *No description.* |
| OcspExpiryInput
| string
| *No description.* |
+| UnifiedCrlInput
| object
| *No description.* |
+| UnifiedCrlOnExistingPathsInput
| object
| *No description.* |
| AutoRebuild
| object
| *No description.* |
| AutoRebuildGracePeriod
| string
| *No description.* |
| Backend
| string
| *No description.* |
+| CrossClusterRevocation
| object
| *No description.* |
| DeltaRebuildInterval
| string
| *No description.* |
| Disable
| object
| *No description.* |
| EnableDelta
| object
| *No description.* |
@@ -433,6 +458,8 @@ PkiSecretBackendCrlConfig.IsTerraformResource(object X);
| Namespace
| string
| *No description.* |
| OcspDisable
| object
| *No description.* |
| OcspExpiry
| string
| *No description.* |
+| UnifiedCrl
| object
| *No description.* |
+| UnifiedCrlOnExistingPaths
| object
| *No description.* |
---
@@ -608,6 +635,16 @@ public string BackendInput { get; }
---
+##### `CrossClusterRevocationInput`Optional
+
+```csharp
+public object CrossClusterRevocationInput { get; }
+```
+
+- *Type:* object
+
+---
+
##### `DeltaRebuildIntervalInput`Optional
```csharp
@@ -688,6 +725,26 @@ public string OcspExpiryInput { get; }
---
+##### `UnifiedCrlInput`Optional
+
+```csharp
+public object UnifiedCrlInput { get; }
+```
+
+- *Type:* object
+
+---
+
+##### `UnifiedCrlOnExistingPathsInput`Optional
+
+```csharp
+public object UnifiedCrlOnExistingPathsInput { get; }
+```
+
+- *Type:* object
+
+---
+
##### `AutoRebuild`Required
```csharp
@@ -718,6 +775,16 @@ public string Backend { get; }
---
+##### `CrossClusterRevocation`Required
+
+```csharp
+public object CrossClusterRevocation { get; }
+```
+
+- *Type:* object
+
+---
+
##### `DeltaRebuildInterval`Required
```csharp
@@ -798,6 +865,26 @@ public string OcspExpiry { get; }
---
+##### `UnifiedCrl`Required
+
+```csharp
+public object UnifiedCrl { get; }
+```
+
+- *Type:* object
+
+---
+
+##### `UnifiedCrlOnExistingPaths`Required
+
+```csharp
+public object UnifiedCrlOnExistingPaths { get; }
+```
+
+- *Type:* object
+
+---
+
#### Constants
| **Name** | **Type** | **Description** |
@@ -836,6 +923,7 @@ new PkiSecretBackendCrlConfigConfig {
string Backend,
object AutoRebuild = null,
string AutoRebuildGracePeriod = null,
+ object CrossClusterRevocation = null,
string DeltaRebuildInterval = null,
object Disable = null,
object EnableDelta = null,
@@ -843,7 +931,9 @@ new PkiSecretBackendCrlConfigConfig {
string Id = null,
string Namespace = null,
object OcspDisable = null,
- string OcspExpiry = null
+ string OcspExpiry = null,
+ object UnifiedCrl = null,
+ object UnifiedCrlOnExistingPaths = null
};
```
@@ -861,6 +951,7 @@ new PkiSecretBackendCrlConfigConfig {
| Backend
| string
| The path of the PKI secret backend the resource belongs to. |
| AutoRebuild
| object
| Enables or disables periodic rebuilding of the CRL upon expiry. |
| AutoRebuildGracePeriod
| string
| Grace period before CRL expiry to attempt rebuild of CRL. |
+| CrossClusterRevocation
| object
| Enable cross-cluster revocation request queues. |
| DeltaRebuildInterval
| string
| Interval to check for new revocations on, to regenerate the delta CRL. |
| Disable
| object
| Disables or enables CRL building. |
| EnableDelta
| object
| Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL. |
@@ -869,6 +960,8 @@ new PkiSecretBackendCrlConfigConfig {
| Namespace
| string
| Target namespace. (requires Enterprise). |
| OcspDisable
| object
| Disables or enables the OCSP responder in Vault. |
| OcspExpiry
| string
| The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations. |
+| UnifiedCrl
| object
| Enables unified CRL and OCSP building. |
+| UnifiedCrlOnExistingPaths
| object
| Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. |
---
@@ -984,6 +1077,20 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault
---
+##### `CrossClusterRevocation`Optional
+
+```csharp
+public object CrossClusterRevocation { get; set; }
+```
+
+- *Type:* object
+
+Enable cross-cluster revocation request queues.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation}
+
+---
+
##### `DeltaRebuildInterval`Optional
```csharp
@@ -1097,5 +1204,33 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault
---
+##### `UnifiedCrl`Optional
+
+```csharp
+public object UnifiedCrl { get; set; }
+```
+
+- *Type:* object
+
+Enables unified CRL and OCSP building.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl}
+
+---
+
+##### `UnifiedCrlOnExistingPaths`Optional
+
+```csharp
+public object UnifiedCrlOnExistingPaths { get; set; }
+```
+
+- *Type:* object
+
+Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths}
+
+---
+
diff --git a/docs/pkiSecretBackendCrlConfig.go.md b/docs/pkiSecretBackendCrlConfig.go.md
index 8fd4d72e3..8371f10e6 100644
--- a/docs/pkiSecretBackendCrlConfig.go.md
+++ b/docs/pkiSecretBackendCrlConfig.go.md
@@ -68,6 +68,7 @@ Must be unique amongst siblings in the same scope
| InterpolationForAttribute
| *No description.* |
| ResetAutoRebuild
| *No description.* |
| ResetAutoRebuildGracePeriod
| *No description.* |
+| ResetCrossClusterRevocation
| *No description.* |
| ResetDeltaRebuildInterval
| *No description.* |
| ResetDisable
| *No description.* |
| ResetEnableDelta
| *No description.* |
@@ -76,6 +77,8 @@ Must be unique amongst siblings in the same scope
| ResetNamespace
| *No description.* |
| ResetOcspDisable
| *No description.* |
| ResetOcspExpiry
| *No description.* |
+| ResetUnifiedCrl
| *No description.* |
+| ResetUnifiedCrlOnExistingPaths
| *No description.* |
---
@@ -275,6 +278,12 @@ func ResetAutoRebuild()
func ResetAutoRebuildGracePeriod()
```
+##### `ResetCrossClusterRevocation`
+
+```go
+func ResetCrossClusterRevocation()
+```
+
##### `ResetDeltaRebuildInterval`
```go
@@ -323,6 +332,18 @@ func ResetOcspDisable()
func ResetOcspExpiry()
```
+##### `ResetUnifiedCrl`
+
+```go
+func ResetUnifiedCrl()
+```
+
+##### `ResetUnifiedCrlOnExistingPaths`
+
+```go
+func ResetUnifiedCrlOnExistingPaths()
+```
+
#### Static Functions
| **Name** | **Description** |
@@ -414,6 +435,7 @@ pkisecretbackendcrlconfig.PkiSecretBackendCrlConfig_IsTerraformResource(x interf
| AutoRebuildGracePeriodInput
| *string
| *No description.* |
| AutoRebuildInput
| interface{}
| *No description.* |
| BackendInput
| *string
| *No description.* |
+| CrossClusterRevocationInput
| interface{}
| *No description.* |
| DeltaRebuildIntervalInput
| *string
| *No description.* |
| DisableInput
| interface{}
| *No description.* |
| EnableDeltaInput
| interface{}
| *No description.* |
@@ -422,9 +444,12 @@ pkisecretbackendcrlconfig.PkiSecretBackendCrlConfig_IsTerraformResource(x interf
| NamespaceInput
| *string
| *No description.* |
| OcspDisableInput
| interface{}
| *No description.* |
| OcspExpiryInput
| *string
| *No description.* |
+| UnifiedCrlInput
| interface{}
| *No description.* |
+| UnifiedCrlOnExistingPathsInput
| interface{}
| *No description.* |
| AutoRebuild
| interface{}
| *No description.* |
| AutoRebuildGracePeriod
| *string
| *No description.* |
| Backend
| *string
| *No description.* |
+| CrossClusterRevocation
| interface{}
| *No description.* |
| DeltaRebuildInterval
| *string
| *No description.* |
| Disable
| interface{}
| *No description.* |
| EnableDelta
| interface{}
| *No description.* |
@@ -433,6 +458,8 @@ pkisecretbackendcrlconfig.PkiSecretBackendCrlConfig_IsTerraformResource(x interf
| Namespace
| *string
| *No description.* |
| OcspDisable
| interface{}
| *No description.* |
| OcspExpiry
| *string
| *No description.* |
+| UnifiedCrl
| interface{}
| *No description.* |
+| UnifiedCrlOnExistingPaths
| interface{}
| *No description.* |
---
@@ -608,6 +635,16 @@ func BackendInput() *string
---
+##### `CrossClusterRevocationInput`Optional
+
+```go
+func CrossClusterRevocationInput() interface{}
+```
+
+- *Type:* interface{}
+
+---
+
##### `DeltaRebuildIntervalInput`Optional
```go
@@ -688,6 +725,26 @@ func OcspExpiryInput() *string
---
+##### `UnifiedCrlInput`Optional
+
+```go
+func UnifiedCrlInput() interface{}
+```
+
+- *Type:* interface{}
+
+---
+
+##### `UnifiedCrlOnExistingPathsInput`Optional
+
+```go
+func UnifiedCrlOnExistingPathsInput() interface{}
+```
+
+- *Type:* interface{}
+
+---
+
##### `AutoRebuild`Required
```go
@@ -718,6 +775,16 @@ func Backend() *string
---
+##### `CrossClusterRevocation`Required
+
+```go
+func CrossClusterRevocation() interface{}
+```
+
+- *Type:* interface{}
+
+---
+
##### `DeltaRebuildInterval`Required
```go
@@ -798,6 +865,26 @@ func OcspExpiry() *string
---
+##### `UnifiedCrl`Required
+
+```go
+func UnifiedCrl() interface{}
+```
+
+- *Type:* interface{}
+
+---
+
+##### `UnifiedCrlOnExistingPaths`Required
+
+```go
+func UnifiedCrlOnExistingPaths() interface{}
+```
+
+- *Type:* interface{}
+
+---
+
#### Constants
| **Name** | **Type** | **Description** |
@@ -836,6 +923,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v5/pkisecretbackendcrlcon
Backend: *string,
AutoRebuild: interface{},
AutoRebuildGracePeriod: *string,
+ CrossClusterRevocation: interface{},
DeltaRebuildInterval: *string,
Disable: interface{},
EnableDelta: interface{},
@@ -844,6 +932,8 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v5/pkisecretbackendcrlcon
Namespace: *string,
OcspDisable: interface{},
OcspExpiry: *string,
+ UnifiedCrl: interface{},
+ UnifiedCrlOnExistingPaths: interface{},
}
```
@@ -861,6 +951,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v5/pkisecretbackendcrlcon
| Backend
| *string
| The path of the PKI secret backend the resource belongs to. |
| AutoRebuild
| interface{}
| Enables or disables periodic rebuilding of the CRL upon expiry. |
| AutoRebuildGracePeriod
| *string
| Grace period before CRL expiry to attempt rebuild of CRL. |
+| CrossClusterRevocation
| interface{}
| Enable cross-cluster revocation request queues. |
| DeltaRebuildInterval
| *string
| Interval to check for new revocations on, to regenerate the delta CRL. |
| Disable
| interface{}
| Disables or enables CRL building. |
| EnableDelta
| interface{}
| Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL. |
@@ -869,6 +960,8 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v5/pkisecretbackendcrlcon
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| OcspDisable
| interface{}
| Disables or enables the OCSP responder in Vault. |
| OcspExpiry
| *string
| The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations. |
+| UnifiedCrl
| interface{}
| Enables unified CRL and OCSP building. |
+| UnifiedCrlOnExistingPaths
| interface{}
| Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. |
---
@@ -984,6 +1077,20 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault
---
+##### `CrossClusterRevocation`Optional
+
+```go
+CrossClusterRevocation interface{}
+```
+
+- *Type:* interface{}
+
+Enable cross-cluster revocation request queues.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation}
+
+---
+
##### `DeltaRebuildInterval`Optional
```go
@@ -1097,5 +1204,33 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault
---
+##### `UnifiedCrl`Optional
+
+```go
+UnifiedCrl interface{}
+```
+
+- *Type:* interface{}
+
+Enables unified CRL and OCSP building.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl}
+
+---
+
+##### `UnifiedCrlOnExistingPaths`Optional
+
+```go
+UnifiedCrlOnExistingPaths interface{}
+```
+
+- *Type:* interface{}
+
+Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths}
+
+---
+
diff --git a/docs/pkiSecretBackendCrlConfig.java.md b/docs/pkiSecretBackendCrlConfig.java.md
index 10213cd59..fbf72e779 100644
--- a/docs/pkiSecretBackendCrlConfig.java.md
+++ b/docs/pkiSecretBackendCrlConfig.java.md
@@ -26,6 +26,8 @@ PkiSecretBackendCrlConfig.Builder.create(Construct scope, java.lang.String id)
// .autoRebuild(java.lang.Boolean)
// .autoRebuild(IResolvable)
// .autoRebuildGracePeriod(java.lang.String)
+// .crossClusterRevocation(java.lang.Boolean)
+// .crossClusterRevocation(IResolvable)
// .deltaRebuildInterval(java.lang.String)
// .disable(java.lang.Boolean)
// .disable(IResolvable)
@@ -37,6 +39,10 @@ PkiSecretBackendCrlConfig.Builder.create(Construct scope, java.lang.String id)
// .ocspDisable(java.lang.Boolean)
// .ocspDisable(IResolvable)
// .ocspExpiry(java.lang.String)
+// .unifiedCrl(java.lang.Boolean)
+// .unifiedCrl(IResolvable)
+// .unifiedCrlOnExistingPaths(java.lang.Boolean)
+// .unifiedCrlOnExistingPaths(IResolvable)
.build();
```
@@ -54,6 +60,7 @@ PkiSecretBackendCrlConfig.Builder.create(Construct scope, java.lang.String id)
| backend
| java.lang.String
| The path of the PKI secret backend the resource belongs to. |
| autoRebuild
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Enables or disables periodic rebuilding of the CRL upon expiry. |
| autoRebuildGracePeriod
| java.lang.String
| Grace period before CRL expiry to attempt rebuild of CRL. |
+| crossClusterRevocation
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Enable cross-cluster revocation request queues. |
| deltaRebuildInterval
| java.lang.String
| Interval to check for new revocations on, to regenerate the delta CRL. |
| disable
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Disables or enables CRL building. |
| enableDelta
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL. |
@@ -62,6 +69,8 @@ PkiSecretBackendCrlConfig.Builder.create(Construct scope, java.lang.String id)
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| ocspDisable
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Disables or enables the OCSP responder in Vault. |
| ocspExpiry
| java.lang.String
| The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations. |
+| unifiedCrl
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Enables unified CRL and OCSP building. |
+| unifiedCrlOnExistingPaths
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. |
---
@@ -155,6 +164,16 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault
---
+##### `crossClusterRevocation`Optional
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+Enable cross-cluster revocation request queues.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation}
+
+---
+
##### `deltaRebuildInterval`Optional
- *Type:* java.lang.String
@@ -236,6 +255,26 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault
---
+##### `unifiedCrl`Optional
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+Enables unified CRL and OCSP building.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl}
+
+---
+
+##### `unifiedCrlOnExistingPaths`Optional
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths}
+
+---
+
#### Methods
| **Name** | **Description** |
@@ -258,6 +297,7 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault
| interpolationForAttribute
| *No description.* |
| resetAutoRebuild
| *No description.* |
| resetAutoRebuildGracePeriod
| *No description.* |
+| resetCrossClusterRevocation
| *No description.* |
| resetDeltaRebuildInterval
| *No description.* |
| resetDisable
| *No description.* |
| resetEnableDelta
| *No description.* |
@@ -266,6 +306,8 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault
| resetNamespace
| *No description.* |
| resetOcspDisable
| *No description.* |
| resetOcspExpiry
| *No description.* |
+| resetUnifiedCrl
| *No description.* |
+| resetUnifiedCrlOnExistingPaths
| *No description.* |
---
@@ -465,6 +507,12 @@ public void resetAutoRebuild()
public void resetAutoRebuildGracePeriod()
```
+##### `resetCrossClusterRevocation`
+
+```java
+public void resetCrossClusterRevocation()
+```
+
##### `resetDeltaRebuildInterval`
```java
@@ -513,6 +561,18 @@ public void resetOcspDisable()
public void resetOcspExpiry()
```
+##### `resetUnifiedCrl`
+
+```java
+public void resetUnifiedCrl()
+```
+
+##### `resetUnifiedCrlOnExistingPaths`
+
+```java
+public void resetUnifiedCrlOnExistingPaths()
+```
+
#### Static Functions
| **Name** | **Description** |
@@ -604,6 +664,7 @@ PkiSecretBackendCrlConfig.isTerraformResource(java.lang.Object x)
| autoRebuildGracePeriodInput
| java.lang.String
| *No description.* |
| autoRebuildInput
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
| backendInput
| java.lang.String
| *No description.* |
+| crossClusterRevocationInput
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
| deltaRebuildIntervalInput
| java.lang.String
| *No description.* |
| disableInput
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
| enableDeltaInput
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
@@ -612,9 +673,12 @@ PkiSecretBackendCrlConfig.isTerraformResource(java.lang.Object x)
| namespaceInput
| java.lang.String
| *No description.* |
| ocspDisableInput
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
| ocspExpiryInput
| java.lang.String
| *No description.* |
+| unifiedCrlInput
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
+| unifiedCrlOnExistingPathsInput
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
| autoRebuild
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
| autoRebuildGracePeriod
| java.lang.String
| *No description.* |
| backend
| java.lang.String
| *No description.* |
+| crossClusterRevocation
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
| deltaRebuildInterval
| java.lang.String
| *No description.* |
| disable
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
| enableDelta
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
@@ -623,6 +687,8 @@ PkiSecretBackendCrlConfig.isTerraformResource(java.lang.Object x)
| namespace
| java.lang.String
| *No description.* |
| ocspDisable
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
| ocspExpiry
| java.lang.String
| *No description.* |
+| unifiedCrl
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
+| unifiedCrlOnExistingPaths
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
---
@@ -798,6 +864,16 @@ public java.lang.String getBackendInput();
---
+##### `crossClusterRevocationInput`Optional
+
+```java
+public java.lang.Object getCrossClusterRevocationInput();
+```
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+---
+
##### `deltaRebuildIntervalInput`Optional
```java
@@ -878,6 +954,26 @@ public java.lang.String getOcspExpiryInput();
---
+##### `unifiedCrlInput`Optional
+
+```java
+public java.lang.Object getUnifiedCrlInput();
+```
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+---
+
+##### `unifiedCrlOnExistingPathsInput`Optional
+
+```java
+public java.lang.Object getUnifiedCrlOnExistingPathsInput();
+```
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+---
+
##### `autoRebuild`Required
```java
@@ -908,6 +1004,16 @@ public java.lang.String getBackend();
---
+##### `crossClusterRevocation`Required
+
+```java
+public java.lang.Object getCrossClusterRevocation();
+```
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+---
+
##### `deltaRebuildInterval`Required
```java
@@ -988,6 +1094,26 @@ public java.lang.String getOcspExpiry();
---
+##### `unifiedCrl`Required
+
+```java
+public java.lang.Object getUnifiedCrl();
+```
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+---
+
+##### `unifiedCrlOnExistingPaths`Required
+
+```java
+public java.lang.Object getUnifiedCrlOnExistingPaths();
+```
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+---
+
#### Constants
| **Name** | **Type** | **Description** |
@@ -1030,6 +1156,8 @@ PkiSecretBackendCrlConfigConfig.builder()
// .autoRebuild(java.lang.Boolean)
// .autoRebuild(IResolvable)
// .autoRebuildGracePeriod(java.lang.String)
+// .crossClusterRevocation(java.lang.Boolean)
+// .crossClusterRevocation(IResolvable)
// .deltaRebuildInterval(java.lang.String)
// .disable(java.lang.Boolean)
// .disable(IResolvable)
@@ -1041,6 +1169,10 @@ PkiSecretBackendCrlConfigConfig.builder()
// .ocspDisable(java.lang.Boolean)
// .ocspDisable(IResolvable)
// .ocspExpiry(java.lang.String)
+// .unifiedCrl(java.lang.Boolean)
+// .unifiedCrl(IResolvable)
+// .unifiedCrlOnExistingPaths(java.lang.Boolean)
+// .unifiedCrlOnExistingPaths(IResolvable)
.build();
```
@@ -1058,6 +1190,7 @@ PkiSecretBackendCrlConfigConfig.builder()
| backend
| java.lang.String
| The path of the PKI secret backend the resource belongs to. |
| autoRebuild
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Enables or disables periodic rebuilding of the CRL upon expiry. |
| autoRebuildGracePeriod
| java.lang.String
| Grace period before CRL expiry to attempt rebuild of CRL. |
+| crossClusterRevocation
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Enable cross-cluster revocation request queues. |
| deltaRebuildInterval
| java.lang.String
| Interval to check for new revocations on, to regenerate the delta CRL. |
| disable
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Disables or enables CRL building. |
| enableDelta
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL. |
@@ -1066,6 +1199,8 @@ PkiSecretBackendCrlConfigConfig.builder()
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| ocspDisable
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Disables or enables the OCSP responder in Vault. |
| ocspExpiry
| java.lang.String
| The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations. |
+| unifiedCrl
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Enables unified CRL and OCSP building. |
+| unifiedCrlOnExistingPaths
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. |
---
@@ -1181,6 +1316,20 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault
---
+##### `crossClusterRevocation`Optional
+
+```java
+public java.lang.Object getCrossClusterRevocation();
+```
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+Enable cross-cluster revocation request queues.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation}
+
+---
+
##### `deltaRebuildInterval`Optional
```java
@@ -1294,5 +1443,33 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault
---
+##### `unifiedCrl`Optional
+
+```java
+public java.lang.Object getUnifiedCrl();
+```
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+Enables unified CRL and OCSP building.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl}
+
+---
+
+##### `unifiedCrlOnExistingPaths`Optional
+
+```java
+public java.lang.Object getUnifiedCrlOnExistingPaths();
+```
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths}
+
+---
+
diff --git a/docs/pkiSecretBackendCrlConfig.python.md b/docs/pkiSecretBackendCrlConfig.python.md
index df0716f93..7acf33c8d 100644
--- a/docs/pkiSecretBackendCrlConfig.python.md
+++ b/docs/pkiSecretBackendCrlConfig.python.md
@@ -24,6 +24,7 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfig(
backend: str,
auto_rebuild: typing.Union[bool, IResolvable] = None,
auto_rebuild_grace_period: str = None,
+ cross_cluster_revocation: typing.Union[bool, IResolvable] = None,
delta_rebuild_interval: str = None,
disable: typing.Union[bool, IResolvable] = None,
enable_delta: typing.Union[bool, IResolvable] = None,
@@ -31,7 +32,9 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfig(
id: str = None,
namespace: str = None,
ocsp_disable: typing.Union[bool, IResolvable] = None,
- ocsp_expiry: str = None
+ ocsp_expiry: str = None,
+ unified_crl: typing.Union[bool, IResolvable] = None,
+ unified_crl_on_existing_paths: typing.Union[bool, IResolvable] = None
)
```
@@ -49,6 +52,7 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfig(
| backend
| str
| The path of the PKI secret backend the resource belongs to. |
| auto_rebuild
| typing.Union[bool, cdktf.IResolvable]
| Enables or disables periodic rebuilding of the CRL upon expiry. |
| auto_rebuild_grace_period
| str
| Grace period before CRL expiry to attempt rebuild of CRL. |
+| cross_cluster_revocation
| typing.Union[bool, cdktf.IResolvable]
| Enable cross-cluster revocation request queues. |
| delta_rebuild_interval
| str
| Interval to check for new revocations on, to regenerate the delta CRL. |
| disable
| typing.Union[bool, cdktf.IResolvable]
| Disables or enables CRL building. |
| enable_delta
| typing.Union[bool, cdktf.IResolvable]
| Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL. |
@@ -57,6 +61,8 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfig(
| namespace
| str
| Target namespace. (requires Enterprise). |
| ocsp_disable
| typing.Union[bool, cdktf.IResolvable]
| Disables or enables the OCSP responder in Vault. |
| ocsp_expiry
| str
| The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations. |
+| unified_crl
| typing.Union[bool, cdktf.IResolvable]
| Enables unified CRL and OCSP building. |
+| unified_crl_on_existing_paths
| typing.Union[bool, cdktf.IResolvable]
| Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. |
---
@@ -150,6 +156,16 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault
---
+##### `cross_cluster_revocation`Optional
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+Enable cross-cluster revocation request queues.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation}
+
+---
+
##### `delta_rebuild_interval`Optional
- *Type:* str
@@ -231,6 +247,26 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault
---
+##### `unified_crl`Optional
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+Enables unified CRL and OCSP building.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl}
+
+---
+
+##### `unified_crl_on_existing_paths`Optional
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths}
+
+---
+
#### Methods
| **Name** | **Description** |
@@ -253,6 +289,7 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault
| interpolation_for_attribute
| *No description.* |
| reset_auto_rebuild
| *No description.* |
| reset_auto_rebuild_grace_period
| *No description.* |
+| reset_cross_cluster_revocation
| *No description.* |
| reset_delta_rebuild_interval
| *No description.* |
| reset_disable
| *No description.* |
| reset_enable_delta
| *No description.* |
@@ -261,6 +298,8 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault
| reset_namespace
| *No description.* |
| reset_ocsp_disable
| *No description.* |
| reset_ocsp_expiry
| *No description.* |
+| reset_unified_crl
| *No description.* |
+| reset_unified_crl_on_existing_paths
| *No description.* |
---
@@ -485,6 +524,12 @@ def reset_auto_rebuild() -> None
def reset_auto_rebuild_grace_period() -> None
```
+##### `reset_cross_cluster_revocation`
+
+```python
+def reset_cross_cluster_revocation() -> None
+```
+
##### `reset_delta_rebuild_interval`
```python
@@ -533,6 +578,18 @@ def reset_ocsp_disable() -> None
def reset_ocsp_expiry() -> None
```
+##### `reset_unified_crl`
+
+```python
+def reset_unified_crl() -> None
+```
+
+##### `reset_unified_crl_on_existing_paths`
+
+```python
+def reset_unified_crl_on_existing_paths() -> None
+```
+
#### Static Functions
| **Name** | **Description** |
@@ -630,6 +687,7 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfig.is_terraform_resource(
| auto_rebuild_grace_period_input
| str
| *No description.* |
| auto_rebuild_input
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
| backend_input
| str
| *No description.* |
+| cross_cluster_revocation_input
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
| delta_rebuild_interval_input
| str
| *No description.* |
| disable_input
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
| enable_delta_input
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
@@ -638,9 +696,12 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfig.is_terraform_resource(
| namespace_input
| str
| *No description.* |
| ocsp_disable_input
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
| ocsp_expiry_input
| str
| *No description.* |
+| unified_crl_input
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
+| unified_crl_on_existing_paths_input
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
| auto_rebuild
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
| auto_rebuild_grace_period
| str
| *No description.* |
| backend
| str
| *No description.* |
+| cross_cluster_revocation
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
| delta_rebuild_interval
| str
| *No description.* |
| disable
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
| enable_delta
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
@@ -649,6 +710,8 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfig.is_terraform_resource(
| namespace
| str
| *No description.* |
| ocsp_disable
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
| ocsp_expiry
| str
| *No description.* |
+| unified_crl
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
+| unified_crl_on_existing_paths
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
---
@@ -824,6 +887,16 @@ backend_input: str
---
+##### `cross_cluster_revocation_input`Optional
+
+```python
+cross_cluster_revocation_input: typing.Union[bool, IResolvable]
+```
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+---
+
##### `delta_rebuild_interval_input`Optional
```python
@@ -904,6 +977,26 @@ ocsp_expiry_input: str
---
+##### `unified_crl_input`Optional
+
+```python
+unified_crl_input: typing.Union[bool, IResolvable]
+```
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+---
+
+##### `unified_crl_on_existing_paths_input`Optional
+
+```python
+unified_crl_on_existing_paths_input: typing.Union[bool, IResolvable]
+```
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+---
+
##### `auto_rebuild`Required
```python
@@ -934,6 +1027,16 @@ backend: str
---
+##### `cross_cluster_revocation`Required
+
+```python
+cross_cluster_revocation: typing.Union[bool, IResolvable]
+```
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+---
+
##### `delta_rebuild_interval`Required
```python
@@ -1014,6 +1117,26 @@ ocsp_expiry: str
---
+##### `unified_crl`Required
+
+```python
+unified_crl: typing.Union[bool, IResolvable]
+```
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+---
+
+##### `unified_crl_on_existing_paths`Required
+
+```python
+unified_crl_on_existing_paths: typing.Union[bool, IResolvable]
+```
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+---
+
#### Constants
| **Name** | **Type** | **Description** |
@@ -1052,6 +1175,7 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfigConfig(
backend: str,
auto_rebuild: typing.Union[bool, IResolvable] = None,
auto_rebuild_grace_period: str = None,
+ cross_cluster_revocation: typing.Union[bool, IResolvable] = None,
delta_rebuild_interval: str = None,
disable: typing.Union[bool, IResolvable] = None,
enable_delta: typing.Union[bool, IResolvable] = None,
@@ -1059,7 +1183,9 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfigConfig(
id: str = None,
namespace: str = None,
ocsp_disable: typing.Union[bool, IResolvable] = None,
- ocsp_expiry: str = None
+ ocsp_expiry: str = None,
+ unified_crl: typing.Union[bool, IResolvable] = None,
+ unified_crl_on_existing_paths: typing.Union[bool, IResolvable] = None
)
```
@@ -1077,6 +1203,7 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfigConfig(
| backend
| str
| The path of the PKI secret backend the resource belongs to. |
| auto_rebuild
| typing.Union[bool, cdktf.IResolvable]
| Enables or disables periodic rebuilding of the CRL upon expiry. |
| auto_rebuild_grace_period
| str
| Grace period before CRL expiry to attempt rebuild of CRL. |
+| cross_cluster_revocation
| typing.Union[bool, cdktf.IResolvable]
| Enable cross-cluster revocation request queues. |
| delta_rebuild_interval
| str
| Interval to check for new revocations on, to regenerate the delta CRL. |
| disable
| typing.Union[bool, cdktf.IResolvable]
| Disables or enables CRL building. |
| enable_delta
| typing.Union[bool, cdktf.IResolvable]
| Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL. |
@@ -1085,6 +1212,8 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfigConfig(
| namespace
| str
| Target namespace. (requires Enterprise). |
| ocsp_disable
| typing.Union[bool, cdktf.IResolvable]
| Disables or enables the OCSP responder in Vault. |
| ocsp_expiry
| str
| The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations. |
+| unified_crl
| typing.Union[bool, cdktf.IResolvable]
| Enables unified CRL and OCSP building. |
+| unified_crl_on_existing_paths
| typing.Union[bool, cdktf.IResolvable]
| Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. |
---
@@ -1200,6 +1329,20 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault
---
+##### `cross_cluster_revocation`Optional
+
+```python
+cross_cluster_revocation: typing.Union[bool, IResolvable]
+```
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+Enable cross-cluster revocation request queues.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation}
+
+---
+
##### `delta_rebuild_interval`Optional
```python
@@ -1313,5 +1456,33 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault
---
+##### `unified_crl`Optional
+
+```python
+unified_crl: typing.Union[bool, IResolvable]
+```
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+Enables unified CRL and OCSP building.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl}
+
+---
+
+##### `unified_crl_on_existing_paths`Optional
+
+```python
+unified_crl_on_existing_paths: typing.Union[bool, IResolvable]
+```
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths}
+
+---
+
diff --git a/docs/pkiSecretBackendCrlConfig.typescript.md b/docs/pkiSecretBackendCrlConfig.typescript.md
index 852858074..d283386df 100644
--- a/docs/pkiSecretBackendCrlConfig.typescript.md
+++ b/docs/pkiSecretBackendCrlConfig.typescript.md
@@ -68,6 +68,7 @@ Must be unique amongst siblings in the same scope
| interpolationForAttribute
| *No description.* |
| resetAutoRebuild
| *No description.* |
| resetAutoRebuildGracePeriod
| *No description.* |
+| resetCrossClusterRevocation
| *No description.* |
| resetDeltaRebuildInterval
| *No description.* |
| resetDisable
| *No description.* |
| resetEnableDelta
| *No description.* |
@@ -76,6 +77,8 @@ Must be unique amongst siblings in the same scope
| resetNamespace
| *No description.* |
| resetOcspDisable
| *No description.* |
| resetOcspExpiry
| *No description.* |
+| resetUnifiedCrl
| *No description.* |
+| resetUnifiedCrlOnExistingPaths
| *No description.* |
---
@@ -275,6 +278,12 @@ public resetAutoRebuild(): void
public resetAutoRebuildGracePeriod(): void
```
+##### `resetCrossClusterRevocation`
+
+```typescript
+public resetCrossClusterRevocation(): void
+```
+
##### `resetDeltaRebuildInterval`
```typescript
@@ -323,6 +332,18 @@ public resetOcspDisable(): void
public resetOcspExpiry(): void
```
+##### `resetUnifiedCrl`
+
+```typescript
+public resetUnifiedCrl(): void
+```
+
+##### `resetUnifiedCrlOnExistingPaths`
+
+```typescript
+public resetUnifiedCrlOnExistingPaths(): void
+```
+
#### Static Functions
| **Name** | **Description** |
@@ -414,6 +435,7 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfig.isTerraformResource(x: any)
| autoRebuildGracePeriodInput
| string
| *No description.* |
| autoRebuildInput
| boolean \| cdktf.IResolvable
| *No description.* |
| backendInput
| string
| *No description.* |
+| crossClusterRevocationInput
| boolean \| cdktf.IResolvable
| *No description.* |
| deltaRebuildIntervalInput
| string
| *No description.* |
| disableInput
| boolean \| cdktf.IResolvable
| *No description.* |
| enableDeltaInput
| boolean \| cdktf.IResolvable
| *No description.* |
@@ -422,9 +444,12 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfig.isTerraformResource(x: any)
| namespaceInput
| string
| *No description.* |
| ocspDisableInput
| boolean \| cdktf.IResolvable
| *No description.* |
| ocspExpiryInput
| string
| *No description.* |
+| unifiedCrlInput
| boolean \| cdktf.IResolvable
| *No description.* |
+| unifiedCrlOnExistingPathsInput
| boolean \| cdktf.IResolvable
| *No description.* |
| autoRebuild
| boolean \| cdktf.IResolvable
| *No description.* |
| autoRebuildGracePeriod
| string
| *No description.* |
| backend
| string
| *No description.* |
+| crossClusterRevocation
| boolean \| cdktf.IResolvable
| *No description.* |
| deltaRebuildInterval
| string
| *No description.* |
| disable
| boolean \| cdktf.IResolvable
| *No description.* |
| enableDelta
| boolean \| cdktf.IResolvable
| *No description.* |
@@ -433,6 +458,8 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfig.isTerraformResource(x: any)
| namespace
| string
| *No description.* |
| ocspDisable
| boolean \| cdktf.IResolvable
| *No description.* |
| ocspExpiry
| string
| *No description.* |
+| unifiedCrl
| boolean \| cdktf.IResolvable
| *No description.* |
+| unifiedCrlOnExistingPaths
| boolean \| cdktf.IResolvable
| *No description.* |
---
@@ -608,6 +635,16 @@ public readonly backendInput: string;
---
+##### `crossClusterRevocationInput`Optional
+
+```typescript
+public readonly crossClusterRevocationInput: boolean | IResolvable;
+```
+
+- *Type:* boolean | cdktf.IResolvable
+
+---
+
##### `deltaRebuildIntervalInput`Optional
```typescript
@@ -688,6 +725,26 @@ public readonly ocspExpiryInput: string;
---
+##### `unifiedCrlInput`Optional
+
+```typescript
+public readonly unifiedCrlInput: boolean | IResolvable;
+```
+
+- *Type:* boolean | cdktf.IResolvable
+
+---
+
+##### `unifiedCrlOnExistingPathsInput`Optional
+
+```typescript
+public readonly unifiedCrlOnExistingPathsInput: boolean | IResolvable;
+```
+
+- *Type:* boolean | cdktf.IResolvable
+
+---
+
##### `autoRebuild`Required
```typescript
@@ -718,6 +775,16 @@ public readonly backend: string;
---
+##### `crossClusterRevocation`Required
+
+```typescript
+public readonly crossClusterRevocation: boolean | IResolvable;
+```
+
+- *Type:* boolean | cdktf.IResolvable
+
+---
+
##### `deltaRebuildInterval`Required
```typescript
@@ -798,6 +865,26 @@ public readonly ocspExpiry: string;
---
+##### `unifiedCrl`Required
+
+```typescript
+public readonly unifiedCrl: boolean | IResolvable;
+```
+
+- *Type:* boolean | cdktf.IResolvable
+
+---
+
+##### `unifiedCrlOnExistingPaths`Required
+
+```typescript
+public readonly unifiedCrlOnExistingPaths: boolean | IResolvable;
+```
+
+- *Type:* boolean | cdktf.IResolvable
+
+---
+
#### Constants
| **Name** | **Type** | **Description** |
@@ -842,6 +929,7 @@ const pkiSecretBackendCrlConfigConfig: pkiSecretBackendCrlConfig.PkiSecretBacken
| backend
| string
| The path of the PKI secret backend the resource belongs to. |
| autoRebuild
| boolean \| cdktf.IResolvable
| Enables or disables periodic rebuilding of the CRL upon expiry. |
| autoRebuildGracePeriod
| string
| Grace period before CRL expiry to attempt rebuild of CRL. |
+| crossClusterRevocation
| boolean \| cdktf.IResolvable
| Enable cross-cluster revocation request queues. |
| deltaRebuildInterval
| string
| Interval to check for new revocations on, to regenerate the delta CRL. |
| disable
| boolean \| cdktf.IResolvable
| Disables or enables CRL building. |
| enableDelta
| boolean \| cdktf.IResolvable
| Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL. |
@@ -850,6 +938,8 @@ const pkiSecretBackendCrlConfigConfig: pkiSecretBackendCrlConfig.PkiSecretBacken
| namespace
| string
| Target namespace. (requires Enterprise). |
| ocspDisable
| boolean \| cdktf.IResolvable
| Disables or enables the OCSP responder in Vault. |
| ocspExpiry
| string
| The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations. |
+| unifiedCrl
| boolean \| cdktf.IResolvable
| Enables unified CRL and OCSP building. |
+| unifiedCrlOnExistingPaths
| boolean \| cdktf.IResolvable
| Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. |
---
@@ -965,6 +1055,20 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault
---
+##### `crossClusterRevocation`Optional
+
+```typescript
+public readonly crossClusterRevocation: boolean | IResolvable;
+```
+
+- *Type:* boolean | cdktf.IResolvable
+
+Enable cross-cluster revocation request queues.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation}
+
+---
+
##### `deltaRebuildInterval`Optional
```typescript
@@ -1078,5 +1182,33 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault
---
+##### `unifiedCrl`Optional
+
+```typescript
+public readonly unifiedCrl: boolean | IResolvable;
+```
+
+- *Type:* boolean | cdktf.IResolvable
+
+Enables unified CRL and OCSP building.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl}
+
+---
+
+##### `unifiedCrlOnExistingPaths`Optional
+
+```typescript
+public readonly unifiedCrlOnExistingPaths: boolean | IResolvable;
+```
+
+- *Type:* boolean | cdktf.IResolvable
+
+Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths.
+
+Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths}
+
+---
+
diff --git a/package.json b/package.json
index ef8ed7fcb..1f474940a 100644
--- a/package.json
+++ b/package.json
@@ -150,7 +150,7 @@
"cdktf": {
"provider": {
"name": "registry.terraform.io/hashicorp/vault",
- "version": "3.13.0"
+ "version": "3.14.0"
}
},
"resolutions": {
diff --git a/src/ad-secret-backend/index.ts b/src/ad-secret-backend/index.ts
index 86306ae89..b027756cf 100644
--- a/src/ad-secret-backend/index.ts
+++ b/src/ad-secret-backend/index.ts
@@ -258,7 +258,7 @@ export class AdSecretBackend extends cdktf.TerraformResource {
terraformResourceType: 'vault_ad_secret_backend',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/ad-secret-library/index.ts b/src/ad-secret-library/index.ts
index b4be65857..1342eda14 100644
--- a/src/ad-secret-library/index.ts
+++ b/src/ad-secret-library/index.ts
@@ -84,7 +84,7 @@ export class AdSecretLibrary extends cdktf.TerraformResource {
terraformResourceType: 'vault_ad_secret_library',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/ad-secret-role/index.ts b/src/ad-secret-role/index.ts
index 089da50d4..adfdfefff 100644
--- a/src/ad-secret-role/index.ts
+++ b/src/ad-secret-role/index.ts
@@ -72,7 +72,7 @@ export class AdSecretRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_ad_secret_role',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/alicloud-auth-backend-role/index.ts b/src/alicloud-auth-backend-role/index.ts
index c9ab809fa..41228216a 100644
--- a/src/alicloud-auth-backend-role/index.ts
+++ b/src/alicloud-auth-backend-role/index.ts
@@ -120,7 +120,7 @@ export class AlicloudAuthBackendRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_alicloud_auth_backend_role',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/approle-auth-backend-login/index.ts b/src/approle-auth-backend-login/index.ts
index 762ffd90d..fa3a8774f 100644
--- a/src/approle-auth-backend-login/index.ts
+++ b/src/approle-auth-backend-login/index.ts
@@ -66,7 +66,7 @@ export class ApproleAuthBackendLogin extends cdktf.TerraformResource {
terraformResourceType: 'vault_approle_auth_backend_login',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/approle-auth-backend-role-secret-id/index.ts b/src/approle-auth-backend-role-secret-id/index.ts
index 997ef70c8..a6dcf3c82 100644
--- a/src/approle-auth-backend-role-secret-id/index.ts
+++ b/src/approle-auth-backend-role-secret-id/index.ts
@@ -90,7 +90,7 @@ export class ApproleAuthBackendRoleSecretId extends cdktf.TerraformResource {
terraformResourceType: 'vault_approle_auth_backend_role_secret_id',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/approle-auth-backend-role/index.ts b/src/approle-auth-backend-role/index.ts
index c9a479438..447a6d0be 100644
--- a/src/approle-auth-backend-role/index.ts
+++ b/src/approle-auth-backend-role/index.ts
@@ -144,7 +144,7 @@ export class ApproleAuthBackendRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_approle_auth_backend_role',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/audit-request-header/README.md b/src/audit-request-header/README.md
new file mode 100644
index 000000000..0b3845a7e
--- /dev/null
+++ b/src/audit-request-header/README.md
@@ -0,0 +1,3 @@
+# `vault_audit_request_header`
+
+Refer to the Terraform Registory for docs: [`vault_audit_request_header`](https://www.terraform.io/docs/providers/vault/r/audit_request_header).
diff --git a/src/audit-request-header/index.ts b/src/audit-request-header/index.ts
new file mode 100644
index 000000000..ec3be0cc5
--- /dev/null
+++ b/src/audit-request-header/index.ts
@@ -0,0 +1,157 @@
+// https://www.terraform.io/docs/providers/vault/r/audit_request_header
+// generated from terraform resource schema
+
+import { Construct } from 'constructs';
+import * as cdktf from 'cdktf';
+
+// Configuration
+
+export interface AuditRequestHeaderConfig extends cdktf.TerraformMetaArguments {
+ /**
+ * Whether this header's value should be HMAC'd in the audit logs.
+ *
+ * Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#hmac AuditRequestHeader#hmac}
+ */
+ readonly hmac?: boolean | cdktf.IResolvable;
+ /**
+ * Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id}
+ *
+ * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
+ * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
+ */
+ readonly id?: string;
+ /**
+ * The name of the request header to audit.
+ *
+ * Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#name AuditRequestHeader#name}
+ */
+ readonly name: string;
+ /**
+ * Target namespace. (requires Enterprise)
+ *
+ * Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#namespace AuditRequestHeader#namespace}
+ */
+ readonly namespace?: string;
+}
+
+/**
+* Represents a {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header vault_audit_request_header}
+*/
+export class AuditRequestHeader extends cdktf.TerraformResource {
+
+ // =================
+ // STATIC PROPERTIES
+ // =================
+ public static readonly tfResourceType = "vault_audit_request_header";
+
+ // ===========
+ // INITIALIZER
+ // ===========
+
+ /**
+ * Create a new {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header vault_audit_request_header} Resource
+ *
+ * @param scope The scope in which to define this construct
+ * @param id The scoped construct ID. Must be unique amongst siblings in the same scope
+ * @param options AuditRequestHeaderConfig
+ */
+ public constructor(scope: Construct, id: string, config: AuditRequestHeaderConfig) {
+ super(scope, id, {
+ terraformResourceType: 'vault_audit_request_header',
+ terraformGeneratorMetadata: {
+ providerName: 'vault',
+ providerVersion: '3.14.0',
+ providerVersionConstraint: '~> 3.7'
+ },
+ provider: config.provider,
+ dependsOn: config.dependsOn,
+ count: config.count,
+ lifecycle: config.lifecycle,
+ provisioners: config.provisioners,
+ connection: config.connection,
+ forEach: config.forEach
+ });
+ this._hmac = config.hmac;
+ this._id = config.id;
+ this._name = config.name;
+ this._namespace = config.namespace;
+ }
+
+ // ==========
+ // ATTRIBUTES
+ // ==========
+
+ // hmac - computed: false, optional: true, required: false
+ private _hmac?: boolean | cdktf.IResolvable;
+ public get hmac() {
+ return this.getBooleanAttribute('hmac');
+ }
+ public set hmac(value: boolean | cdktf.IResolvable) {
+ this._hmac = value;
+ }
+ public resetHmac() {
+ this._hmac = undefined;
+ }
+ // Temporarily expose input value. Use with caution.
+ public get hmacInput() {
+ return this._hmac;
+ }
+
+ // id - computed: true, optional: true, required: false
+ private _id?: string;
+ public get id() {
+ return this.getStringAttribute('id');
+ }
+ public set id(value: string) {
+ this._id = value;
+ }
+ public resetId() {
+ this._id = undefined;
+ }
+ // Temporarily expose input value. Use with caution.
+ public get idInput() {
+ return this._id;
+ }
+
+ // name - computed: false, optional: false, required: true
+ private _name?: string;
+ public get name() {
+ return this.getStringAttribute('name');
+ }
+ public set name(value: string) {
+ this._name = value;
+ }
+ // Temporarily expose input value. Use with caution.
+ public get nameInput() {
+ return this._name;
+ }
+
+ // namespace - computed: false, optional: true, required: false
+ private _namespace?: string;
+ public get namespace() {
+ return this.getStringAttribute('namespace');
+ }
+ public set namespace(value: string) {
+ this._namespace = value;
+ }
+ public resetNamespace() {
+ this._namespace = undefined;
+ }
+ // Temporarily expose input value. Use with caution.
+ public get namespaceInput() {
+ return this._namespace;
+ }
+
+ // =========
+ // SYNTHESIS
+ // =========
+
+ protected synthesizeAttributes(): { [name: string]: any } {
+ return {
+ hmac: cdktf.booleanToTerraform(this._hmac),
+ id: cdktf.stringToTerraform(this._id),
+ name: cdktf.stringToTerraform(this._name),
+ namespace: cdktf.stringToTerraform(this._namespace),
+ };
+ }
+}
diff --git a/src/audit/index.ts b/src/audit/index.ts
index 490dc1fa9..6618dbc6b 100644
--- a/src/audit/index.ts
+++ b/src/audit/index.ts
@@ -78,7 +78,7 @@ export class Audit extends cdktf.TerraformResource {
terraformResourceType: 'vault_audit',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/auth-backend/index.ts b/src/auth-backend/index.ts
index 99bb0d1e2..6eeb7887c 100644
--- a/src/auth-backend/index.ts
+++ b/src/auth-backend/index.ts
@@ -368,7 +368,7 @@ export class AuthBackend extends cdktf.TerraformResource {
terraformResourceType: 'vault_auth_backend',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/aws-auth-backend-cert/index.ts b/src/aws-auth-backend-cert/index.ts
index 04896e189..1fbe055fe 100644
--- a/src/aws-auth-backend-cert/index.ts
+++ b/src/aws-auth-backend-cert/index.ts
@@ -72,7 +72,7 @@ export class AwsAuthBackendCert extends cdktf.TerraformResource {
terraformResourceType: 'vault_aws_auth_backend_cert',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/aws-auth-backend-client/index.ts b/src/aws-auth-backend-client/index.ts
index a0b8b44e1..6c1338979 100644
--- a/src/aws-auth-backend-client/index.ts
+++ b/src/aws-auth-backend-client/index.ts
@@ -96,7 +96,7 @@ export class AwsAuthBackendClient extends cdktf.TerraformResource {
terraformResourceType: 'vault_aws_auth_backend_client',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/aws-auth-backend-config-identity/index.ts b/src/aws-auth-backend-config-identity/index.ts
index e739de2db..13362e990 100644
--- a/src/aws-auth-backend-config-identity/index.ts
+++ b/src/aws-auth-backend-config-identity/index.ts
@@ -72,7 +72,7 @@ export class AwsAuthBackendConfigIdentity extends cdktf.TerraformResource {
terraformResourceType: 'vault_aws_auth_backend_config_identity',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/aws-auth-backend-identity-whitelist/index.ts b/src/aws-auth-backend-identity-whitelist/index.ts
index 5e27cba59..c0d6e4e77 100644
--- a/src/aws-auth-backend-identity-whitelist/index.ts
+++ b/src/aws-auth-backend-identity-whitelist/index.ts
@@ -66,7 +66,7 @@ export class AwsAuthBackendIdentityWhitelist extends cdktf.TerraformResource {
terraformResourceType: 'vault_aws_auth_backend_identity_whitelist',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/aws-auth-backend-login/index.ts b/src/aws-auth-backend-login/index.ts
index 694c497b2..df5af30fc 100644
--- a/src/aws-auth-backend-login/index.ts
+++ b/src/aws-auth-backend-login/index.ts
@@ -108,7 +108,7 @@ export class AwsAuthBackendLogin extends cdktf.TerraformResource {
terraformResourceType: 'vault_aws_auth_backend_login',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/aws-auth-backend-role-tag/index.ts b/src/aws-auth-backend-role-tag/index.ts
index 95550dd45..0c0358ae6 100644
--- a/src/aws-auth-backend-role-tag/index.ts
+++ b/src/aws-auth-backend-role-tag/index.ts
@@ -90,7 +90,7 @@ export class AwsAuthBackendRoleTag extends cdktf.TerraformResource {
terraformResourceType: 'vault_aws_auth_backend_role_tag',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/aws-auth-backend-role/index.ts b/src/aws-auth-backend-role/index.ts
index c5cb81ad4..8cb92b2d1 100644
--- a/src/aws-auth-backend-role/index.ts
+++ b/src/aws-auth-backend-role/index.ts
@@ -210,7 +210,7 @@ export class AwsAuthBackendRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_aws_auth_backend_role',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/aws-auth-backend-roletag-blacklist/index.ts b/src/aws-auth-backend-roletag-blacklist/index.ts
index 75b199458..7475c1761 100644
--- a/src/aws-auth-backend-roletag-blacklist/index.ts
+++ b/src/aws-auth-backend-roletag-blacklist/index.ts
@@ -66,7 +66,7 @@ export class AwsAuthBackendRoletagBlacklist extends cdktf.TerraformResource {
terraformResourceType: 'vault_aws_auth_backend_roletag_blacklist',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/aws-auth-backend-sts-role/index.ts b/src/aws-auth-backend-sts-role/index.ts
index 63bc785de..1235f1967 100644
--- a/src/aws-auth-backend-sts-role/index.ts
+++ b/src/aws-auth-backend-sts-role/index.ts
@@ -66,7 +66,7 @@ export class AwsAuthBackendStsRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_aws_auth_backend_sts_role',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/aws-secret-backend-role/index.ts b/src/aws-secret-backend-role/index.ts
index af5ec9b12..63d1a78dd 100644
--- a/src/aws-secret-backend-role/index.ts
+++ b/src/aws-secret-backend-role/index.ts
@@ -114,7 +114,7 @@ export class AwsSecretBackendRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_aws_secret_backend_role',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/aws-secret-backend/index.ts b/src/aws-secret-backend/index.ts
index ffa1472a1..2b8ba2cc8 100644
--- a/src/aws-secret-backend/index.ts
+++ b/src/aws-secret-backend/index.ts
@@ -114,7 +114,7 @@ export class AwsSecretBackend extends cdktf.TerraformResource {
terraformResourceType: 'vault_aws_secret_backend',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/azure-auth-backend-config/index.ts b/src/azure-auth-backend-config/index.ts
index f9326b568..cd27aced6 100644
--- a/src/azure-auth-backend-config/index.ts
+++ b/src/azure-auth-backend-config/index.ts
@@ -84,7 +84,7 @@ export class AzureAuthBackendConfig extends cdktf.TerraformResource {
terraformResourceType: 'vault_azure_auth_backend_config',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/azure-auth-backend-role/index.ts b/src/azure-auth-backend-role/index.ts
index eeed1714b..4a14d3704 100644
--- a/src/azure-auth-backend-role/index.ts
+++ b/src/azure-auth-backend-role/index.ts
@@ -150,7 +150,7 @@ export class AzureAuthBackendRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_azure_auth_backend_role',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/azure-secret-backend-role/index.ts b/src/azure-secret-backend-role/index.ts
index 682f09c62..f34dd8917 100644
--- a/src/azure-secret-backend-role/index.ts
+++ b/src/azure-secret-backend-role/index.ts
@@ -343,7 +343,7 @@ export class AzureSecretBackendRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_azure_secret_backend_role',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/azure-secret-backend/index.ts b/src/azure-secret-backend/index.ts
index 81f48428a..aef6ff440 100644
--- a/src/azure-secret-backend/index.ts
+++ b/src/azure-secret-backend/index.ts
@@ -102,7 +102,7 @@ export class AzureSecretBackend extends cdktf.TerraformResource {
terraformResourceType: 'vault_azure_secret_backend',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/cert-auth-backend-role/index.ts b/src/cert-auth-backend-role/index.ts
index 0ae29de29..b9bf4c0d6 100644
--- a/src/cert-auth-backend-role/index.ts
+++ b/src/cert-auth-backend-role/index.ts
@@ -150,7 +150,7 @@ export class CertAuthBackendRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_cert_auth_backend_role',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/consul-secret-backend-role/index.ts b/src/consul-secret-backend-role/index.ts
index 3df451f46..1f3bd328f 100644
--- a/src/consul-secret-backend-role/index.ts
+++ b/src/consul-secret-backend-role/index.ts
@@ -128,7 +128,7 @@ export class ConsulSecretBackendRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_consul_secret_backend_role',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/consul-secret-backend/index.ts b/src/consul-secret-backend/index.ts
index f8209cf44..8c5c26834 100644
--- a/src/consul-secret-backend/index.ts
+++ b/src/consul-secret-backend/index.ts
@@ -126,7 +126,7 @@ export class ConsulSecretBackend extends cdktf.TerraformResource {
terraformResourceType: 'vault_consul_secret_backend',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/data-vault-ad-access-credentials/index.ts b/src/data-vault-ad-access-credentials/index.ts
index 161cdcd37..2d698d587 100644
--- a/src/data-vault-ad-access-credentials/index.ts
+++ b/src/data-vault-ad-access-credentials/index.ts
@@ -60,7 +60,7 @@ export class DataVaultAdAccessCredentials extends cdktf.TerraformDataSource {
terraformResourceType: 'vault_ad_access_credentials',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/data-vault-approle-auth-backend-role-id/index.ts b/src/data-vault-approle-auth-backend-role-id/index.ts
index 2c2720978..f849627de 100644
--- a/src/data-vault-approle-auth-backend-role-id/index.ts
+++ b/src/data-vault-approle-auth-backend-role-id/index.ts
@@ -60,7 +60,7 @@ export class DataVaultApproleAuthBackendRoleId extends cdktf.TerraformDataSource
terraformResourceType: 'vault_approle_auth_backend_role_id',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/data-vault-auth-backend/index.ts b/src/data-vault-auth-backend/index.ts
index 4108fe6d0..bd36a2e8e 100644
--- a/src/data-vault-auth-backend/index.ts
+++ b/src/data-vault-auth-backend/index.ts
@@ -54,7 +54,7 @@ export class DataVaultAuthBackend extends cdktf.TerraformDataSource {
terraformResourceType: 'vault_auth_backend',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/data-vault-aws-access-credentials/index.ts b/src/data-vault-aws-access-credentials/index.ts
index c5843faab..0efae086a 100644
--- a/src/data-vault-aws-access-credentials/index.ts
+++ b/src/data-vault-aws-access-credentials/index.ts
@@ -84,7 +84,7 @@ export class DataVaultAwsAccessCredentials extends cdktf.TerraformDataSource {
terraformResourceType: 'vault_aws_access_credentials',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/data-vault-azure-access-credentials/index.ts b/src/data-vault-azure-access-credentials/index.ts
index 226ac2188..ab1daae21 100644
--- a/src/data-vault-azure-access-credentials/index.ts
+++ b/src/data-vault-azure-access-credentials/index.ts
@@ -104,7 +104,7 @@ export class DataVaultAzureAccessCredentials extends cdktf.TerraformDataSource {
terraformResourceType: 'vault_azure_access_credentials',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/data-vault-gcp-auth-backend-role/index.ts b/src/data-vault-gcp-auth-backend-role/index.ts
index f30c7ce54..daed2d6b6 100644
--- a/src/data-vault-gcp-auth-backend-role/index.ts
+++ b/src/data-vault-gcp-auth-backend-role/index.ts
@@ -114,7 +114,7 @@ export class DataVaultGcpAuthBackendRole extends cdktf.TerraformDataSource {
terraformResourceType: 'vault_gcp_auth_backend_role',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/data-vault-generic-secret/index.ts b/src/data-vault-generic-secret/index.ts
index 4211c1d1a..8b183ea93 100644
--- a/src/data-vault-generic-secret/index.ts
+++ b/src/data-vault-generic-secret/index.ts
@@ -64,7 +64,7 @@ export class DataVaultGenericSecret extends cdktf.TerraformDataSource {
terraformResourceType: 'vault_generic_secret',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/data-vault-identity-entity/index.ts b/src/data-vault-identity-entity/index.ts
index bdd0a0e40..20334451d 100644
--- a/src/data-vault-identity-entity/index.ts
+++ b/src/data-vault-identity-entity/index.ts
@@ -188,7 +188,7 @@ export class DataVaultIdentityEntity extends cdktf.TerraformDataSource {
terraformResourceType: 'vault_identity_entity',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/data-vault-identity-group/index.ts b/src/data-vault-identity-group/index.ts
index 7812782e7..7d8f4a621 100644
--- a/src/data-vault-identity-group/index.ts
+++ b/src/data-vault-identity-group/index.ts
@@ -78,7 +78,7 @@ export class DataVaultIdentityGroup extends cdktf.TerraformDataSource {
terraformResourceType: 'vault_identity_group',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/data-vault-identity-oidc-client-creds/index.ts b/src/data-vault-identity-oidc-client-creds/index.ts
index b0903e572..33ea06274 100644
--- a/src/data-vault-identity-oidc-client-creds/index.ts
+++ b/src/data-vault-identity-oidc-client-creds/index.ts
@@ -54,7 +54,7 @@ export class DataVaultIdentityOidcClientCreds extends cdktf.TerraformDataSource
terraformResourceType: 'vault_identity_oidc_client_creds',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/data-vault-identity-oidc-openid-config/index.ts b/src/data-vault-identity-oidc-openid-config/index.ts
index a1845069b..d2d569ef3 100644
--- a/src/data-vault-identity-oidc-openid-config/index.ts
+++ b/src/data-vault-identity-oidc-openid-config/index.ts
@@ -54,7 +54,7 @@ export class DataVaultIdentityOidcOpenidConfig extends cdktf.TerraformDataSource
terraformResourceType: 'vault_identity_oidc_openid_config',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/data-vault-identity-oidc-public-keys/index.ts b/src/data-vault-identity-oidc-public-keys/index.ts
index 4f9311ea3..db1615842 100644
--- a/src/data-vault-identity-oidc-public-keys/index.ts
+++ b/src/data-vault-identity-oidc-public-keys/index.ts
@@ -54,7 +54,7 @@ export class DataVaultIdentityOidcPublicKeys extends cdktf.TerraformDataSource {
terraformResourceType: 'vault_identity_oidc_public_keys',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/data-vault-kubernetes-auth-backend-config/index.ts b/src/data-vault-kubernetes-auth-backend-config/index.ts
index 5097b6d3c..9c1a64f09 100644
--- a/src/data-vault-kubernetes-auth-backend-config/index.ts
+++ b/src/data-vault-kubernetes-auth-backend-config/index.ts
@@ -90,7 +90,7 @@ export class DataVaultKubernetesAuthBackendConfig extends cdktf.TerraformDataSou
terraformResourceType: 'vault_kubernetes_auth_backend_config',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/data-vault-kubernetes-auth-backend-role/index.ts b/src/data-vault-kubernetes-auth-backend-role/index.ts
index a801c7d3f..24598e9df 100644
--- a/src/data-vault-kubernetes-auth-backend-role/index.ts
+++ b/src/data-vault-kubernetes-auth-backend-role/index.ts
@@ -120,7 +120,7 @@ export class DataVaultKubernetesAuthBackendRole extends cdktf.TerraformDataSourc
terraformResourceType: 'vault_kubernetes_auth_backend_role',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/data-vault-kubernetes-service-account-token/index.ts b/src/data-vault-kubernetes-service-account-token/index.ts
index cb541412b..5b56e779e 100644
--- a/src/data-vault-kubernetes-service-account-token/index.ts
+++ b/src/data-vault-kubernetes-service-account-token/index.ts
@@ -78,7 +78,7 @@ export class DataVaultKubernetesServiceAccountToken extends cdktf.TerraformDataS
terraformResourceType: 'vault_kubernetes_service_account_token',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/data-vault-kv-secret-subkeys-v2/index.ts b/src/data-vault-kv-secret-subkeys-v2/index.ts
index 7e9d9bf9e..2b295c2d8 100644
--- a/src/data-vault-kv-secret-subkeys-v2/index.ts
+++ b/src/data-vault-kv-secret-subkeys-v2/index.ts
@@ -72,7 +72,7 @@ export class DataVaultKvSecretSubkeysV2 extends cdktf.TerraformDataSource {
terraformResourceType: 'vault_kv_secret_subkeys_v2',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/data-vault-kv-secret-v2/index.ts b/src/data-vault-kv-secret-v2/index.ts
index 89e1df653..0455d47d5 100644
--- a/src/data-vault-kv-secret-v2/index.ts
+++ b/src/data-vault-kv-secret-v2/index.ts
@@ -66,7 +66,7 @@ export class DataVaultKvSecretV2 extends cdktf.TerraformDataSource {
terraformResourceType: 'vault_kv_secret_v2',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/data-vault-kv-secret/index.ts b/src/data-vault-kv-secret/index.ts
index c43fd129f..a6360fd13 100644
--- a/src/data-vault-kv-secret/index.ts
+++ b/src/data-vault-kv-secret/index.ts
@@ -54,7 +54,7 @@ export class DataVaultKvSecret extends cdktf.TerraformDataSource {
terraformResourceType: 'vault_kv_secret',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/data-vault-kv-secrets-list-v2/index.ts b/src/data-vault-kv-secrets-list-v2/index.ts
index 3eb6c0888..9be3d778c 100644
--- a/src/data-vault-kv-secrets-list-v2/index.ts
+++ b/src/data-vault-kv-secrets-list-v2/index.ts
@@ -60,7 +60,7 @@ export class DataVaultKvSecretsListV2 extends cdktf.TerraformDataSource {
terraformResourceType: 'vault_kv_secrets_list_v2',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/data-vault-kv-secrets-list/index.ts b/src/data-vault-kv-secrets-list/index.ts
index ebf1a99a6..8e078d7e1 100644
--- a/src/data-vault-kv-secrets-list/index.ts
+++ b/src/data-vault-kv-secrets-list/index.ts
@@ -54,7 +54,7 @@ export class DataVaultKvSecretsList extends cdktf.TerraformDataSource {
terraformResourceType: 'vault_kv_secrets_list',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/data-vault-nomad-access-token/index.ts b/src/data-vault-nomad-access-token/index.ts
index 8667cec26..99ffc745d 100644
--- a/src/data-vault-nomad-access-token/index.ts
+++ b/src/data-vault-nomad-access-token/index.ts
@@ -60,7 +60,7 @@ export class DataVaultNomadAccessToken extends cdktf.TerraformDataSource {
terraformResourceType: 'vault_nomad_access_token',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/data-vault-policy-document/index.ts b/src/data-vault-policy-document/index.ts
index 7319629e4..31474a78b 100644
--- a/src/data-vault-policy-document/index.ts
+++ b/src/data-vault-policy-document/index.ts
@@ -574,7 +574,7 @@ export class DataVaultPolicyDocument extends cdktf.TerraformDataSource {
terraformResourceType: 'vault_policy_document',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/data-vault-raft-autopilot-state/index.ts b/src/data-vault-raft-autopilot-state/index.ts
index 6f65bd13d..2eaa25e0d 100644
--- a/src/data-vault-raft-autopilot-state/index.ts
+++ b/src/data-vault-raft-autopilot-state/index.ts
@@ -48,7 +48,7 @@ export class DataVaultRaftAutopilotState extends cdktf.TerraformDataSource {
terraformResourceType: 'vault_raft_autopilot_state',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/data-vault-transform-decode/index.ts b/src/data-vault-transform-decode/index.ts
index 850e76116..60273720e 100644
--- a/src/data-vault-transform-decode/index.ts
+++ b/src/data-vault-transform-decode/index.ts
@@ -96,7 +96,7 @@ export class DataVaultTransformDecode extends cdktf.TerraformDataSource {
terraformResourceType: 'vault_transform_decode',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/data-vault-transform-encode/index.ts b/src/data-vault-transform-encode/index.ts
index 10058f27d..91753ee64 100644
--- a/src/data-vault-transform-encode/index.ts
+++ b/src/data-vault-transform-encode/index.ts
@@ -96,7 +96,7 @@ export class DataVaultTransformEncode extends cdktf.TerraformDataSource {
terraformResourceType: 'vault_transform_encode',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/data-vault-transit-decrypt/index.ts b/src/data-vault-transit-decrypt/index.ts
index 9adb6f981..cde39cd8a 100644
--- a/src/data-vault-transit-decrypt/index.ts
+++ b/src/data-vault-transit-decrypt/index.ts
@@ -72,7 +72,7 @@ export class DataVaultTransitDecrypt extends cdktf.TerraformDataSource {
terraformResourceType: 'vault_transit_decrypt',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/data-vault-transit-encrypt/index.ts b/src/data-vault-transit-encrypt/index.ts
index 88100ec69..c1cb1787a 100644
--- a/src/data-vault-transit-encrypt/index.ts
+++ b/src/data-vault-transit-encrypt/index.ts
@@ -78,7 +78,7 @@ export class DataVaultTransitEncrypt extends cdktf.TerraformDataSource {
terraformResourceType: 'vault_transit_encrypt',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/database-secret-backend-connection/index.ts b/src/database-secret-backend-connection/index.ts
index 33b752994..281b52500 100644
--- a/src/database-secret-backend-connection/index.ts
+++ b/src/database-secret-backend-connection/index.ts
@@ -4749,7 +4749,7 @@ export class DatabaseSecretBackendConnection extends cdktf.TerraformResource {
terraformResourceType: 'vault_database_secret_backend_connection',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/database-secret-backend-role/index.ts b/src/database-secret-backend-role/index.ts
index 044d4ec42..6b6dbcb1b 100644
--- a/src/database-secret-backend-role/index.ts
+++ b/src/database-secret-backend-role/index.ts
@@ -102,7 +102,7 @@ export class DatabaseSecretBackendRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_database_secret_backend_role',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/database-secret-backend-static-role/index.ts b/src/database-secret-backend-static-role/index.ts
index 9021ca7b5..d6d88df7b 100644
--- a/src/database-secret-backend-static-role/index.ts
+++ b/src/database-secret-backend-static-role/index.ts
@@ -84,7 +84,7 @@ export class DatabaseSecretBackendStaticRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_database_secret_backend_static_role',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/database-secrets-mount/index.ts b/src/database-secrets-mount/index.ts
index e0862e36a..12234fda8 100644
--- a/src/database-secrets-mount/index.ts
+++ b/src/database-secrets-mount/index.ts
@@ -8427,7 +8427,7 @@ export class DatabaseSecretsMount extends cdktf.TerraformResource {
terraformResourceType: 'vault_database_secrets_mount',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/egp-policy/index.ts b/src/egp-policy/index.ts
index 0e85226e9..f1cb97073 100644
--- a/src/egp-policy/index.ts
+++ b/src/egp-policy/index.ts
@@ -72,7 +72,7 @@ export class EgpPolicy extends cdktf.TerraformResource {
terraformResourceType: 'vault_egp_policy',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/gcp-auth-backend-role/index.ts b/src/gcp-auth-backend-role/index.ts
index 6ff3d3dda..3ee80df35 100644
--- a/src/gcp-auth-backend-role/index.ts
+++ b/src/gcp-auth-backend-role/index.ts
@@ -150,7 +150,7 @@ export class GcpAuthBackendRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_gcp_auth_backend_role',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/gcp-auth-backend/index.ts b/src/gcp-auth-backend/index.ts
index 5e149b1a2..de4f857c1 100644
--- a/src/gcp-auth-backend/index.ts
+++ b/src/gcp-auth-backend/index.ts
@@ -248,7 +248,7 @@ export class GcpAuthBackend extends cdktf.TerraformResource {
terraformResourceType: 'vault_gcp_auth_backend',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/gcp-secret-backend/index.ts b/src/gcp-secret-backend/index.ts
index f7c002b11..8d7c4aaea 100644
--- a/src/gcp-secret-backend/index.ts
+++ b/src/gcp-secret-backend/index.ts
@@ -90,7 +90,7 @@ export class GcpSecretBackend extends cdktf.TerraformResource {
terraformResourceType: 'vault_gcp_secret_backend',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/gcp-secret-impersonated-account/README.md b/src/gcp-secret-impersonated-account/README.md
new file mode 100644
index 000000000..60f38993a
--- /dev/null
+++ b/src/gcp-secret-impersonated-account/README.md
@@ -0,0 +1,3 @@
+# `vault_gcp_secret_impersonated_account`
+
+Refer to the Terraform Registory for docs: [`vault_gcp_secret_impersonated_account`](https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account).
diff --git a/src/gcp-secret-impersonated-account/index.ts b/src/gcp-secret-impersonated-account/index.ts
new file mode 100644
index 000000000..8dfd4858d
--- /dev/null
+++ b/src/gcp-secret-impersonated-account/index.ts
@@ -0,0 +1,204 @@
+// https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account
+// generated from terraform resource schema
+
+import { Construct } from 'constructs';
+import * as cdktf from 'cdktf';
+
+// Configuration
+
+export interface GcpSecretImpersonatedAccountConfig extends cdktf.TerraformMetaArguments {
+ /**
+ * Path where the GCP secrets engine is mounted.
+ *
+ * Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend}
+ */
+ readonly backend: string;
+ /**
+ * Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}
+ *
+ * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
+ * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
+ */
+ readonly id?: string;
+ /**
+ * Name of the Impersonated Account to create
+ *
+ * Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account}
+ */
+ readonly impersonatedAccount: string;
+ /**
+ * Target namespace. (requires Enterprise)
+ *
+ * Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace}
+ */
+ readonly namespace?: string;
+ /**
+ * Email of the GCP service account.
+ *
+ * Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email}
+ */
+ readonly serviceAccountEmail: string;
+ /**
+ * List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only)
+ *
+ * Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes}
+ */
+ readonly tokenScopes?: string[];
+}
+
+/**
+* Represents a {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}
+*/
+export class GcpSecretImpersonatedAccount extends cdktf.TerraformResource {
+
+ // =================
+ // STATIC PROPERTIES
+ // =================
+ public static readonly tfResourceType = "vault_gcp_secret_impersonated_account";
+
+ // ===========
+ // INITIALIZER
+ // ===========
+
+ /**
+ * Create a new {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account} Resource
+ *
+ * @param scope The scope in which to define this construct
+ * @param id The scoped construct ID. Must be unique amongst siblings in the same scope
+ * @param options GcpSecretImpersonatedAccountConfig
+ */
+ public constructor(scope: Construct, id: string, config: GcpSecretImpersonatedAccountConfig) {
+ super(scope, id, {
+ terraformResourceType: 'vault_gcp_secret_impersonated_account',
+ terraformGeneratorMetadata: {
+ providerName: 'vault',
+ providerVersion: '3.14.0',
+ providerVersionConstraint: '~> 3.7'
+ },
+ provider: config.provider,
+ dependsOn: config.dependsOn,
+ count: config.count,
+ lifecycle: config.lifecycle,
+ provisioners: config.provisioners,
+ connection: config.connection,
+ forEach: config.forEach
+ });
+ this._backend = config.backend;
+ this._id = config.id;
+ this._impersonatedAccount = config.impersonatedAccount;
+ this._namespace = config.namespace;
+ this._serviceAccountEmail = config.serviceAccountEmail;
+ this._tokenScopes = config.tokenScopes;
+ }
+
+ // ==========
+ // ATTRIBUTES
+ // ==========
+
+ // backend - computed: false, optional: false, required: true
+ private _backend?: string;
+ public get backend() {
+ return this.getStringAttribute('backend');
+ }
+ public set backend(value: string) {
+ this._backend = value;
+ }
+ // Temporarily expose input value. Use with caution.
+ public get backendInput() {
+ return this._backend;
+ }
+
+ // id - computed: true, optional: true, required: false
+ private _id?: string;
+ public get id() {
+ return this.getStringAttribute('id');
+ }
+ public set id(value: string) {
+ this._id = value;
+ }
+ public resetId() {
+ this._id = undefined;
+ }
+ // Temporarily expose input value. Use with caution.
+ public get idInput() {
+ return this._id;
+ }
+
+ // impersonated_account - computed: false, optional: false, required: true
+ private _impersonatedAccount?: string;
+ public get impersonatedAccount() {
+ return this.getStringAttribute('impersonated_account');
+ }
+ public set impersonatedAccount(value: string) {
+ this._impersonatedAccount = value;
+ }
+ // Temporarily expose input value. Use with caution.
+ public get impersonatedAccountInput() {
+ return this._impersonatedAccount;
+ }
+
+ // namespace - computed: false, optional: true, required: false
+ private _namespace?: string;
+ public get namespace() {
+ return this.getStringAttribute('namespace');
+ }
+ public set namespace(value: string) {
+ this._namespace = value;
+ }
+ public resetNamespace() {
+ this._namespace = undefined;
+ }
+ // Temporarily expose input value. Use with caution.
+ public get namespaceInput() {
+ return this._namespace;
+ }
+
+ // service_account_email - computed: false, optional: false, required: true
+ private _serviceAccountEmail?: string;
+ public get serviceAccountEmail() {
+ return this.getStringAttribute('service_account_email');
+ }
+ public set serviceAccountEmail(value: string) {
+ this._serviceAccountEmail = value;
+ }
+ // Temporarily expose input value. Use with caution.
+ public get serviceAccountEmailInput() {
+ return this._serviceAccountEmail;
+ }
+
+ // service_account_project - computed: true, optional: false, required: false
+ public get serviceAccountProject() {
+ return this.getStringAttribute('service_account_project');
+ }
+
+ // token_scopes - computed: false, optional: true, required: false
+ private _tokenScopes?: string[];
+ public get tokenScopes() {
+ return cdktf.Fn.tolist(this.getListAttribute('token_scopes'));
+ }
+ public set tokenScopes(value: string[]) {
+ this._tokenScopes = value;
+ }
+ public resetTokenScopes() {
+ this._tokenScopes = undefined;
+ }
+ // Temporarily expose input value. Use with caution.
+ public get tokenScopesInput() {
+ return this._tokenScopes;
+ }
+
+ // =========
+ // SYNTHESIS
+ // =========
+
+ protected synthesizeAttributes(): { [name: string]: any } {
+ return {
+ backend: cdktf.stringToTerraform(this._backend),
+ id: cdktf.stringToTerraform(this._id),
+ impersonated_account: cdktf.stringToTerraform(this._impersonatedAccount),
+ namespace: cdktf.stringToTerraform(this._namespace),
+ service_account_email: cdktf.stringToTerraform(this._serviceAccountEmail),
+ token_scopes: cdktf.listMapper(cdktf.stringToTerraform, false)(this._tokenScopes),
+ };
+ }
+}
diff --git a/src/gcp-secret-roleset/index.ts b/src/gcp-secret-roleset/index.ts
index 22b50a5c7..45a56a08c 100644
--- a/src/gcp-secret-roleset/index.ts
+++ b/src/gcp-secret-roleset/index.ts
@@ -206,7 +206,7 @@ export class GcpSecretRoleset extends cdktf.TerraformResource {
terraformResourceType: 'vault_gcp_secret_roleset',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/gcp-secret-static-account/index.ts b/src/gcp-secret-static-account/index.ts
index 295090a57..334b3f91c 100644
--- a/src/gcp-secret-static-account/index.ts
+++ b/src/gcp-secret-static-account/index.ts
@@ -206,7 +206,7 @@ export class GcpSecretStaticAccount extends cdktf.TerraformResource {
terraformResourceType: 'vault_gcp_secret_static_account',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/generic-endpoint/index.ts b/src/generic-endpoint/index.ts
index b5ed73669..7930b209b 100644
--- a/src/generic-endpoint/index.ts
+++ b/src/generic-endpoint/index.ts
@@ -84,7 +84,7 @@ export class GenericEndpoint extends cdktf.TerraformResource {
terraformResourceType: 'vault_generic_endpoint',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/generic-secret/index.ts b/src/generic-secret/index.ts
index b7575458f..a207e0357 100644
--- a/src/generic-secret/index.ts
+++ b/src/generic-secret/index.ts
@@ -72,7 +72,7 @@ export class GenericSecret extends cdktf.TerraformResource {
terraformResourceType: 'vault_generic_secret',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/github-auth-backend/index.ts b/src/github-auth-backend/index.ts
index 06edc7a16..af7e76df0 100644
--- a/src/github-auth-backend/index.ts
+++ b/src/github-auth-backend/index.ts
@@ -428,7 +428,7 @@ export class GithubAuthBackend extends cdktf.TerraformResource {
terraformResourceType: 'vault_github_auth_backend',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/github-team/index.ts b/src/github-team/index.ts
index ef41f7275..0062edce9 100644
--- a/src/github-team/index.ts
+++ b/src/github-team/index.ts
@@ -66,7 +66,7 @@ export class GithubTeam extends cdktf.TerraformResource {
terraformResourceType: 'vault_github_team',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/github-user/index.ts b/src/github-user/index.ts
index aef8c1dd7..f9663c720 100644
--- a/src/github-user/index.ts
+++ b/src/github-user/index.ts
@@ -66,7 +66,7 @@ export class GithubUser extends cdktf.TerraformResource {
terraformResourceType: 'vault_github_user',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/identity-entity-alias/index.ts b/src/identity-entity-alias/index.ts
index 156d64aff..c8a11a1ed 100644
--- a/src/identity-entity-alias/index.ts
+++ b/src/identity-entity-alias/index.ts
@@ -72,7 +72,7 @@ export class IdentityEntityAlias extends cdktf.TerraformResource {
terraformResourceType: 'vault_identity_entity_alias',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/identity-entity-policies/index.ts b/src/identity-entity-policies/index.ts
index abbdb368f..b765c6fdb 100644
--- a/src/identity-entity-policies/index.ts
+++ b/src/identity-entity-policies/index.ts
@@ -66,7 +66,7 @@ export class IdentityEntityPolicies extends cdktf.TerraformResource {
terraformResourceType: 'vault_identity_entity_policies',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/identity-entity/index.ts b/src/identity-entity/index.ts
index b07f1f7e0..d99555420 100644
--- a/src/identity-entity/index.ts
+++ b/src/identity-entity/index.ts
@@ -78,7 +78,7 @@ export class IdentityEntity extends cdktf.TerraformResource {
terraformResourceType: 'vault_identity_entity',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/identity-group-alias/index.ts b/src/identity-group-alias/index.ts
index 208295d40..a9301536f 100644
--- a/src/identity-group-alias/index.ts
+++ b/src/identity-group-alias/index.ts
@@ -66,7 +66,7 @@ export class IdentityGroupAlias extends cdktf.TerraformResource {
terraformResourceType: 'vault_identity_group_alias',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/identity-group-member-entity-ids/index.ts b/src/identity-group-member-entity-ids/index.ts
index d7b13aeef..cfd8eaa4b 100644
--- a/src/identity-group-member-entity-ids/index.ts
+++ b/src/identity-group-member-entity-ids/index.ts
@@ -67,7 +67,7 @@ export class IdentityGroupMemberEntityIds extends cdktf.TerraformResource {
terraformResourceType: 'vault_identity_group_member_entity_ids',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/identity-group-member-group-ids/index.ts b/src/identity-group-member-group-ids/index.ts
index 0d618e7cf..79ba2b572 100644
--- a/src/identity-group-member-group-ids/index.ts
+++ b/src/identity-group-member-group-ids/index.ts
@@ -67,7 +67,7 @@ export class IdentityGroupMemberGroupIds extends cdktf.TerraformResource {
terraformResourceType: 'vault_identity_group_member_group_ids',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/identity-group-policies/index.ts b/src/identity-group-policies/index.ts
index 46e23cc8c..9c2c83a2d 100644
--- a/src/identity-group-policies/index.ts
+++ b/src/identity-group-policies/index.ts
@@ -66,7 +66,7 @@ export class IdentityGroupPolicies extends cdktf.TerraformResource {
terraformResourceType: 'vault_identity_group_policies',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/identity-group/index.ts b/src/identity-group/index.ts
index b5eddf919..91dfe6f30 100644
--- a/src/identity-group/index.ts
+++ b/src/identity-group/index.ts
@@ -102,7 +102,7 @@ export class IdentityGroup extends cdktf.TerraformResource {
terraformResourceType: 'vault_identity_group',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/identity-mfa-duo/index.ts b/src/identity-mfa-duo/index.ts
index 222a6c24d..204686572 100644
--- a/src/identity-mfa-duo/index.ts
+++ b/src/identity-mfa-duo/index.ts
@@ -84,7 +84,7 @@ export class IdentityMfaDuo extends cdktf.TerraformResource {
terraformResourceType: 'vault_identity_mfa_duo',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/identity-mfa-login-enforcement/index.ts b/src/identity-mfa-login-enforcement/index.ts
index 89f05de4a..17c95bb17 100644
--- a/src/identity-mfa-login-enforcement/index.ts
+++ b/src/identity-mfa-login-enforcement/index.ts
@@ -84,7 +84,7 @@ export class IdentityMfaLoginEnforcement extends cdktf.TerraformResource {
terraformResourceType: 'vault_identity_mfa_login_enforcement',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/identity-mfa-okta/index.ts b/src/identity-mfa-okta/index.ts
index 008b69a7a..9100c6759 100644
--- a/src/identity-mfa-okta/index.ts
+++ b/src/identity-mfa-okta/index.ts
@@ -78,7 +78,7 @@ export class IdentityMfaOkta extends cdktf.TerraformResource {
terraformResourceType: 'vault_identity_mfa_okta',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/identity-mfa-pingid/index.ts b/src/identity-mfa-pingid/index.ts
index 461e59399..15a51ffe6 100644
--- a/src/identity-mfa-pingid/index.ts
+++ b/src/identity-mfa-pingid/index.ts
@@ -60,7 +60,7 @@ export class IdentityMfaPingid extends cdktf.TerraformResource {
terraformResourceType: 'vault_identity_mfa_pingid',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/identity-mfa-totp/index.ts b/src/identity-mfa-totp/index.ts
index 55594f5ca..8f0aa66ce 100644
--- a/src/identity-mfa-totp/index.ts
+++ b/src/identity-mfa-totp/index.ts
@@ -90,7 +90,7 @@ export class IdentityMfaTotp extends cdktf.TerraformResource {
terraformResourceType: 'vault_identity_mfa_totp',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/identity-oidc-assignment/index.ts b/src/identity-oidc-assignment/index.ts
index d85ae6a0c..fdb8f1858 100644
--- a/src/identity-oidc-assignment/index.ts
+++ b/src/identity-oidc-assignment/index.ts
@@ -66,7 +66,7 @@ export class IdentityOidcAssignment extends cdktf.TerraformResource {
terraformResourceType: 'vault_identity_oidc_assignment',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/identity-oidc-client/index.ts b/src/identity-oidc-client/index.ts
index aca30c2f9..91ebd5b5f 100644
--- a/src/identity-oidc-client/index.ts
+++ b/src/identity-oidc-client/index.ts
@@ -90,7 +90,7 @@ export class IdentityOidcClient extends cdktf.TerraformResource {
terraformResourceType: 'vault_identity_oidc_client',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/identity-oidc-key-allowed-client-id/index.ts b/src/identity-oidc-key-allowed-client-id/index.ts
index bfbc8c42b..8ccdb3c89 100644
--- a/src/identity-oidc-key-allowed-client-id/index.ts
+++ b/src/identity-oidc-key-allowed-client-id/index.ts
@@ -60,7 +60,7 @@ export class IdentityOidcKeyAllowedClientId extends cdktf.TerraformResource {
terraformResourceType: 'vault_identity_oidc_key_allowed_client_id',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/identity-oidc-key/index.ts b/src/identity-oidc-key/index.ts
index 92084ba33..e1904b058 100644
--- a/src/identity-oidc-key/index.ts
+++ b/src/identity-oidc-key/index.ts
@@ -78,7 +78,7 @@ export class IdentityOidcKey extends cdktf.TerraformResource {
terraformResourceType: 'vault_identity_oidc_key',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/identity-oidc-provider/index.ts b/src/identity-oidc-provider/index.ts
index e8779b59b..46e361f38 100644
--- a/src/identity-oidc-provider/index.ts
+++ b/src/identity-oidc-provider/index.ts
@@ -78,7 +78,7 @@ export class IdentityOidcProvider extends cdktf.TerraformResource {
terraformResourceType: 'vault_identity_oidc_provider',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/identity-oidc-role/index.ts b/src/identity-oidc-role/index.ts
index 6c38c66a6..273e6bf6c 100644
--- a/src/identity-oidc-role/index.ts
+++ b/src/identity-oidc-role/index.ts
@@ -78,7 +78,7 @@ export class IdentityOidcRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_identity_oidc_role',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/identity-oidc-scope/index.ts b/src/identity-oidc-scope/index.ts
index ac6c7166f..f39a4ec41 100644
--- a/src/identity-oidc-scope/index.ts
+++ b/src/identity-oidc-scope/index.ts
@@ -66,7 +66,7 @@ export class IdentityOidcScope extends cdktf.TerraformResource {
terraformResourceType: 'vault_identity_oidc_scope',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/identity-oidc/index.ts b/src/identity-oidc/index.ts
index f0a32b3c3..2990c2c69 100644
--- a/src/identity-oidc/index.ts
+++ b/src/identity-oidc/index.ts
@@ -54,7 +54,7 @@ export class IdentityOidc extends cdktf.TerraformResource {
terraformResourceType: 'vault_identity_oidc',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/index.ts b/src/index.ts
index c115548c9..e3fc9efc3 100644
--- a/src/index.ts
+++ b/src/index.ts
@@ -7,6 +7,7 @@ export * as approleAuthBackendLogin from './approle-auth-backend-login';
export * as approleAuthBackendRole from './approle-auth-backend-role';
export * as approleAuthBackendRoleSecretId from './approle-auth-backend-role-secret-id';
export * as audit from './audit';
+export * as auditRequestHeader from './audit-request-header';
export * as authBackend from './auth-backend';
export * as awsAuthBackendCert from './aws-auth-backend-cert';
export * as awsAuthBackendClient from './aws-auth-backend-client';
@@ -34,6 +35,7 @@ export * as egpPolicy from './egp-policy';
export * as gcpAuthBackend from './gcp-auth-backend';
export * as gcpAuthBackendRole from './gcp-auth-backend-role';
export * as gcpSecretBackend from './gcp-secret-backend';
+export * as gcpSecretImpersonatedAccount from './gcp-secret-impersonated-account';
export * as gcpSecretRoleset from './gcp-secret-roleset';
export * as gcpSecretStaticAccount from './gcp-secret-static-account';
export * as genericEndpoint from './generic-endpoint';
diff --git a/src/jwt-auth-backend-role/index.ts b/src/jwt-auth-backend-role/index.ts
index 8212c4cfe..2dad8575e 100644
--- a/src/jwt-auth-backend-role/index.ts
+++ b/src/jwt-auth-backend-role/index.ts
@@ -216,7 +216,7 @@ export class JwtAuthBackendRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_jwt_auth_backend_role',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/jwt-auth-backend/index.ts b/src/jwt-auth-backend/index.ts
index 5e638b8a5..1326ba381 100644
--- a/src/jwt-auth-backend/index.ts
+++ b/src/jwt-auth-backend/index.ts
@@ -452,7 +452,7 @@ export class JwtAuthBackend extends cdktf.TerraformResource {
terraformResourceType: 'vault_jwt_auth_backend',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/kmip-secret-backend/index.ts b/src/kmip-secret-backend/index.ts
index df505c962..7ca8b1613 100644
--- a/src/kmip-secret-backend/index.ts
+++ b/src/kmip-secret-backend/index.ts
@@ -120,7 +120,7 @@ export class KmipSecretBackend extends cdktf.TerraformResource {
terraformResourceType: 'vault_kmip_secret_backend',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/kmip-secret-role/index.ts b/src/kmip-secret-role/index.ts
index a4eec11a2..acc506c8e 100644
--- a/src/kmip-secret-role/index.ts
+++ b/src/kmip-secret-role/index.ts
@@ -168,7 +168,7 @@ export class KmipSecretRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_kmip_secret_role',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/kmip-secret-scope/index.ts b/src/kmip-secret-scope/index.ts
index f677aee4b..dfb1668c5 100644
--- a/src/kmip-secret-scope/index.ts
+++ b/src/kmip-secret-scope/index.ts
@@ -66,7 +66,7 @@ export class KmipSecretScope extends cdktf.TerraformResource {
terraformResourceType: 'vault_kmip_secret_scope',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/kubernetes-auth-backend-config/index.ts b/src/kubernetes-auth-backend-config/index.ts
index b51adc5eb..ae41e53df 100644
--- a/src/kubernetes-auth-backend-config/index.ts
+++ b/src/kubernetes-auth-backend-config/index.ts
@@ -96,7 +96,7 @@ export class KubernetesAuthBackendConfig extends cdktf.TerraformResource {
terraformResourceType: 'vault_kubernetes_auth_backend_config',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/kubernetes-auth-backend-role/index.ts b/src/kubernetes-auth-backend-role/index.ts
index 5317dcaae..172652ca2 100644
--- a/src/kubernetes-auth-backend-role/index.ts
+++ b/src/kubernetes-auth-backend-role/index.ts
@@ -138,7 +138,7 @@ export class KubernetesAuthBackendRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_kubernetes_auth_backend_role',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/kubernetes-secret-backend-role/index.ts b/src/kubernetes-secret-backend-role/index.ts
index 6af1a6fe0..fc316c5b8 100644
--- a/src/kubernetes-secret-backend-role/index.ts
+++ b/src/kubernetes-secret-backend-role/index.ts
@@ -120,7 +120,7 @@ export class KubernetesSecretBackendRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_kubernetes_secret_backend_role',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/kubernetes-secret-backend/index.ts b/src/kubernetes-secret-backend/index.ts
index 936fde661..3f30f82a4 100644
--- a/src/kubernetes-secret-backend/index.ts
+++ b/src/kubernetes-secret-backend/index.ts
@@ -138,7 +138,7 @@ export class KubernetesSecretBackend extends cdktf.TerraformResource {
terraformResourceType: 'vault_kubernetes_secret_backend',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/kv-secret-backend-v2/index.ts b/src/kv-secret-backend-v2/index.ts
index 78874fe1c..ec51d776f 100644
--- a/src/kv-secret-backend-v2/index.ts
+++ b/src/kv-secret-backend-v2/index.ts
@@ -72,7 +72,7 @@ export class KvSecretBackendV2 extends cdktf.TerraformResource {
terraformResourceType: 'vault_kv_secret_backend_v2',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/kv-secret-v2/index.ts b/src/kv-secret-v2/index.ts
index 124dbe98e..2c2e400e8 100644
--- a/src/kv-secret-v2/index.ts
+++ b/src/kv-secret-v2/index.ts
@@ -250,7 +250,7 @@ export class KvSecretV2 extends cdktf.TerraformResource {
terraformResourceType: 'vault_kv_secret_v2',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/kv-secret/index.ts b/src/kv-secret/index.ts
index 6bb39590c..b2d4ad887 100644
--- a/src/kv-secret/index.ts
+++ b/src/kv-secret/index.ts
@@ -60,7 +60,7 @@ export class KvSecret extends cdktf.TerraformResource {
terraformResourceType: 'vault_kv_secret',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/ldap-auth-backend-group/index.ts b/src/ldap-auth-backend-group/index.ts
index 244fc2290..cb87f1fff 100644
--- a/src/ldap-auth-backend-group/index.ts
+++ b/src/ldap-auth-backend-group/index.ts
@@ -60,7 +60,7 @@ export class LdapAuthBackendGroup extends cdktf.TerraformResource {
terraformResourceType: 'vault_ldap_auth_backend_group',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/ldap-auth-backend-user/index.ts b/src/ldap-auth-backend-user/index.ts
index d898ba147..cef30c1ba 100644
--- a/src/ldap-auth-backend-user/index.ts
+++ b/src/ldap-auth-backend-user/index.ts
@@ -64,7 +64,7 @@ export class LdapAuthBackendUser extends cdktf.TerraformResource {
terraformResourceType: 'vault_ldap_auth_backend_user',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/ldap-auth-backend/index.ts b/src/ldap-auth-backend/index.ts
index dd639feb7..073ae4396 100644
--- a/src/ldap-auth-backend/index.ts
+++ b/src/ldap-auth-backend/index.ts
@@ -212,7 +212,7 @@ export class LdapAuthBackend extends cdktf.TerraformResource {
terraformResourceType: 'vault_ldap_auth_backend',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/managed-keys/index.ts b/src/managed-keys/index.ts
index 4136c1f3a..f6b56905e 100644
--- a/src/managed-keys/index.ts
+++ b/src/managed-keys/index.ts
@@ -1452,7 +1452,7 @@ export class ManagedKeys extends cdktf.TerraformResource {
terraformResourceType: 'vault_managed_keys',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/mfa-duo/index.ts b/src/mfa-duo/index.ts
index 3a4916ae7..bf80b974b 100644
--- a/src/mfa-duo/index.ts
+++ b/src/mfa-duo/index.ts
@@ -90,7 +90,7 @@ export class MfaDuo extends cdktf.TerraformResource {
terraformResourceType: 'vault_mfa_duo',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/mfa-okta/index.ts b/src/mfa-okta/index.ts
index c72f90692..80a85b8ce 100644
--- a/src/mfa-okta/index.ts
+++ b/src/mfa-okta/index.ts
@@ -92,7 +92,7 @@ export class MfaOkta extends cdktf.TerraformResource {
terraformResourceType: 'vault_mfa_okta',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/mfa-pingid/index.ts b/src/mfa-pingid/index.ts
index 8993f5150..f0cc22dec 100644
--- a/src/mfa-pingid/index.ts
+++ b/src/mfa-pingid/index.ts
@@ -74,7 +74,7 @@ export class MfaPingid extends cdktf.TerraformResource {
terraformResourceType: 'vault_mfa_pingid',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/mfa-totp/index.ts b/src/mfa-totp/index.ts
index c25c68517..84ed907d8 100644
--- a/src/mfa-totp/index.ts
+++ b/src/mfa-totp/index.ts
@@ -98,7 +98,7 @@ export class MfaTotp extends cdktf.TerraformResource {
terraformResourceType: 'vault_mfa_totp',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/mount/index.ts b/src/mount/index.ts
index cf8d9a4e7..87551b67d 100644
--- a/src/mount/index.ts
+++ b/src/mount/index.ts
@@ -120,7 +120,7 @@ export class Mount extends cdktf.TerraformResource {
terraformResourceType: 'vault_mount',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/namespace/index.ts b/src/namespace/index.ts
index 72e337c52..03fef180f 100644
--- a/src/namespace/index.ts
+++ b/src/namespace/index.ts
@@ -60,7 +60,7 @@ export class Namespace extends cdktf.TerraformResource {
terraformResourceType: 'vault_namespace',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/nomad-secret-backend/index.ts b/src/nomad-secret-backend/index.ts
index 98dc2d973..8a37c814f 100644
--- a/src/nomad-secret-backend/index.ts
+++ b/src/nomad-secret-backend/index.ts
@@ -132,7 +132,7 @@ export class NomadSecretBackend extends cdktf.TerraformResource {
terraformResourceType: 'vault_nomad_secret_backend',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/nomad-secret-role/index.ts b/src/nomad-secret-role/index.ts
index dd3fa86f6..88cbdc5d7 100644
--- a/src/nomad-secret-role/index.ts
+++ b/src/nomad-secret-role/index.ts
@@ -78,7 +78,7 @@ export class NomadSecretRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_nomad_secret_role',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/okta-auth-backend-group/index.ts b/src/okta-auth-backend-group/index.ts
index 71195c07f..922609c70 100644
--- a/src/okta-auth-backend-group/index.ts
+++ b/src/okta-auth-backend-group/index.ts
@@ -66,7 +66,7 @@ export class OktaAuthBackendGroupA extends cdktf.TerraformResource {
terraformResourceType: 'vault_okta_auth_backend_group',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/okta-auth-backend-user/index.ts b/src/okta-auth-backend-user/index.ts
index 20cd1c1cf..70af16cc0 100644
--- a/src/okta-auth-backend-user/index.ts
+++ b/src/okta-auth-backend-user/index.ts
@@ -72,7 +72,7 @@ export class OktaAuthBackendUserA extends cdktf.TerraformResource {
terraformResourceType: 'vault_okta_auth_backend_user',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/okta-auth-backend/index.ts b/src/okta-auth-backend/index.ts
index d1eacef35..f528ff616 100644
--- a/src/okta-auth-backend/index.ts
+++ b/src/okta-auth-backend/index.ts
@@ -385,7 +385,7 @@ export class OktaAuthBackend extends cdktf.TerraformResource {
terraformResourceType: 'vault_okta_auth_backend',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/password-policy/index.ts b/src/password-policy/index.ts
index 29eb888f9..9c629735c 100644
--- a/src/password-policy/index.ts
+++ b/src/password-policy/index.ts
@@ -60,7 +60,7 @@ export class PasswordPolicy extends cdktf.TerraformResource {
terraformResourceType: 'vault_password_policy',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/pki-secret-backend-cert/index.ts b/src/pki-secret-backend-cert/index.ts
index 5c1895628..b24041bbc 100644
--- a/src/pki-secret-backend-cert/index.ts
+++ b/src/pki-secret-backend-cert/index.ts
@@ -132,7 +132,7 @@ export class PkiSecretBackendCert extends cdktf.TerraformResource {
terraformResourceType: 'vault_pki_secret_backend_cert',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/pki-secret-backend-config-ca/index.ts b/src/pki-secret-backend-config-ca/index.ts
index b6902d495..1c06ae185 100644
--- a/src/pki-secret-backend-config-ca/index.ts
+++ b/src/pki-secret-backend-config-ca/index.ts
@@ -60,7 +60,7 @@ export class PkiSecretBackendConfigCa extends cdktf.TerraformResource {
terraformResourceType: 'vault_pki_secret_backend_config_ca',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/pki-secret-backend-config-urls/index.ts b/src/pki-secret-backend-config-urls/index.ts
index 9ae6e5349..3bc151f49 100644
--- a/src/pki-secret-backend-config-urls/index.ts
+++ b/src/pki-secret-backend-config-urls/index.ts
@@ -72,7 +72,7 @@ export class PkiSecretBackendConfigUrls extends cdktf.TerraformResource {
terraformResourceType: 'vault_pki_secret_backend_config_urls',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/pki-secret-backend-crl-config/index.ts b/src/pki-secret-backend-crl-config/index.ts
index 3bb0665fe..7b08a252c 100644
--- a/src/pki-secret-backend-crl-config/index.ts
+++ b/src/pki-secret-backend-crl-config/index.ts
@@ -26,6 +26,12 @@ export interface PkiSecretBackendCrlConfigConfig extends cdktf.TerraformMetaArgu
*/
readonly backend: string;
/**
+ * Enable cross-cluster revocation request queues.
+ *
+ * Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation}
+ */
+ readonly crossClusterRevocation?: boolean | cdktf.IResolvable;
+ /**
* Interval to check for new revocations on, to regenerate the delta CRL.
*
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#delta_rebuild_interval PkiSecretBackendCrlConfig#delta_rebuild_interval}
@@ -74,6 +80,18 @@ export interface PkiSecretBackendCrlConfigConfig extends cdktf.TerraformMetaArgu
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#ocsp_expiry PkiSecretBackendCrlConfig#ocsp_expiry}
*/
readonly ocspExpiry?: string;
+ /**
+ * Enables unified CRL and OCSP building.
+ *
+ * Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl}
+ */
+ readonly unifiedCrl?: boolean | cdktf.IResolvable;
+ /**
+ * Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths.
+ *
+ * Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths}
+ */
+ readonly unifiedCrlOnExistingPaths?: boolean | cdktf.IResolvable;
}
/**
@@ -102,7 +120,7 @@ export class PkiSecretBackendCrlConfig extends cdktf.TerraformResource {
terraformResourceType: 'vault_pki_secret_backend_crl_config',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
@@ -116,6 +134,7 @@ export class PkiSecretBackendCrlConfig extends cdktf.TerraformResource {
this._autoRebuild = config.autoRebuild;
this._autoRebuildGracePeriod = config.autoRebuildGracePeriod;
this._backend = config.backend;
+ this._crossClusterRevocation = config.crossClusterRevocation;
this._deltaRebuildInterval = config.deltaRebuildInterval;
this._disable = config.disable;
this._enableDelta = config.enableDelta;
@@ -124,6 +143,8 @@ export class PkiSecretBackendCrlConfig extends cdktf.TerraformResource {
this._namespace = config.namespace;
this._ocspDisable = config.ocspDisable;
this._ocspExpiry = config.ocspExpiry;
+ this._unifiedCrl = config.unifiedCrl;
+ this._unifiedCrlOnExistingPaths = config.unifiedCrlOnExistingPaths;
}
// ==========
@@ -175,6 +196,22 @@ export class PkiSecretBackendCrlConfig extends cdktf.TerraformResource {
return this._backend;
}
+ // cross_cluster_revocation - computed: true, optional: true, required: false
+ private _crossClusterRevocation?: boolean | cdktf.IResolvable;
+ public get crossClusterRevocation() {
+ return this.getBooleanAttribute('cross_cluster_revocation');
+ }
+ public set crossClusterRevocation(value: boolean | cdktf.IResolvable) {
+ this._crossClusterRevocation = value;
+ }
+ public resetCrossClusterRevocation() {
+ this._crossClusterRevocation = undefined;
+ }
+ // Temporarily expose input value. Use with caution.
+ public get crossClusterRevocationInput() {
+ return this._crossClusterRevocation;
+ }
+
// delta_rebuild_interval - computed: true, optional: true, required: false
private _deltaRebuildInterval?: string;
public get deltaRebuildInterval() {
@@ -303,6 +340,38 @@ export class PkiSecretBackendCrlConfig extends cdktf.TerraformResource {
return this._ocspExpiry;
}
+ // unified_crl - computed: true, optional: true, required: false
+ private _unifiedCrl?: boolean | cdktf.IResolvable;
+ public get unifiedCrl() {
+ return this.getBooleanAttribute('unified_crl');
+ }
+ public set unifiedCrl(value: boolean | cdktf.IResolvable) {
+ this._unifiedCrl = value;
+ }
+ public resetUnifiedCrl() {
+ this._unifiedCrl = undefined;
+ }
+ // Temporarily expose input value. Use with caution.
+ public get unifiedCrlInput() {
+ return this._unifiedCrl;
+ }
+
+ // unified_crl_on_existing_paths - computed: true, optional: true, required: false
+ private _unifiedCrlOnExistingPaths?: boolean | cdktf.IResolvable;
+ public get unifiedCrlOnExistingPaths() {
+ return this.getBooleanAttribute('unified_crl_on_existing_paths');
+ }
+ public set unifiedCrlOnExistingPaths(value: boolean | cdktf.IResolvable) {
+ this._unifiedCrlOnExistingPaths = value;
+ }
+ public resetUnifiedCrlOnExistingPaths() {
+ this._unifiedCrlOnExistingPaths = undefined;
+ }
+ // Temporarily expose input value. Use with caution.
+ public get unifiedCrlOnExistingPathsInput() {
+ return this._unifiedCrlOnExistingPaths;
+ }
+
// =========
// SYNTHESIS
// =========
@@ -312,6 +381,7 @@ export class PkiSecretBackendCrlConfig extends cdktf.TerraformResource {
auto_rebuild: cdktf.booleanToTerraform(this._autoRebuild),
auto_rebuild_grace_period: cdktf.stringToTerraform(this._autoRebuildGracePeriod),
backend: cdktf.stringToTerraform(this._backend),
+ cross_cluster_revocation: cdktf.booleanToTerraform(this._crossClusterRevocation),
delta_rebuild_interval: cdktf.stringToTerraform(this._deltaRebuildInterval),
disable: cdktf.booleanToTerraform(this._disable),
enable_delta: cdktf.booleanToTerraform(this._enableDelta),
@@ -320,6 +390,8 @@ export class PkiSecretBackendCrlConfig extends cdktf.TerraformResource {
namespace: cdktf.stringToTerraform(this._namespace),
ocsp_disable: cdktf.booleanToTerraform(this._ocspDisable),
ocsp_expiry: cdktf.stringToTerraform(this._ocspExpiry),
+ unified_crl: cdktf.booleanToTerraform(this._unifiedCrl),
+ unified_crl_on_existing_paths: cdktf.booleanToTerraform(this._unifiedCrlOnExistingPaths),
};
}
}
diff --git a/src/pki-secret-backend-intermediate-cert-request/index.ts b/src/pki-secret-backend-intermediate-cert-request/index.ts
index bee658c07..246cd1656 100644
--- a/src/pki-secret-backend-intermediate-cert-request/index.ts
+++ b/src/pki-secret-backend-intermediate-cert-request/index.ts
@@ -181,7 +181,7 @@ export class PkiSecretBackendIntermediateCertRequest extends cdktf.TerraformReso
terraformResourceType: 'vault_pki_secret_backend_intermediate_cert_request',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/pki-secret-backend-intermediate-set-signed/index.ts b/src/pki-secret-backend-intermediate-set-signed/index.ts
index 973bfd719..c72bc834c 100644
--- a/src/pki-secret-backend-intermediate-set-signed/index.ts
+++ b/src/pki-secret-backend-intermediate-set-signed/index.ts
@@ -60,7 +60,7 @@ export class PkiSecretBackendIntermediateSetSigned extends cdktf.TerraformResour
terraformResourceType: 'vault_pki_secret_backend_intermediate_set_signed',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/pki-secret-backend-role/index.ts b/src/pki-secret-backend-role/index.ts
index b0955d4a0..5b41a8871 100644
--- a/src/pki-secret-backend-role/index.ts
+++ b/src/pki-secret-backend-role/index.ts
@@ -442,7 +442,7 @@ export class PkiSecretBackendRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_pki_secret_backend_role',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/pki-secret-backend-root-cert/index.ts b/src/pki-secret-backend-root-cert/index.ts
index 7d95401b3..ddc127dc9 100644
--- a/src/pki-secret-backend-root-cert/index.ts
+++ b/src/pki-secret-backend-root-cert/index.ts
@@ -192,7 +192,7 @@ export class PkiSecretBackendRootCert extends cdktf.TerraformResource {
terraformResourceType: 'vault_pki_secret_backend_root_cert',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/pki-secret-backend-root-sign-intermediate/index.ts b/src/pki-secret-backend-root-sign-intermediate/index.ts
index bd6d6ab1f..906b4389f 100644
--- a/src/pki-secret-backend-root-sign-intermediate/index.ts
+++ b/src/pki-secret-backend-root-sign-intermediate/index.ts
@@ -174,7 +174,7 @@ export class PkiSecretBackendRootSignIntermediate extends cdktf.TerraformResourc
terraformResourceType: 'vault_pki_secret_backend_root_sign_intermediate',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/pki-secret-backend-sign/index.ts b/src/pki-secret-backend-sign/index.ts
index 9439385ab..d38e37829 100644
--- a/src/pki-secret-backend-sign/index.ts
+++ b/src/pki-secret-backend-sign/index.ts
@@ -126,7 +126,7 @@ export class PkiSecretBackendSign extends cdktf.TerraformResource {
terraformResourceType: 'vault_pki_secret_backend_sign',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/policy/index.ts b/src/policy/index.ts
index 392bf26e1..bec6a34dc 100644
--- a/src/policy/index.ts
+++ b/src/policy/index.ts
@@ -60,7 +60,7 @@ export class Policy extends cdktf.TerraformResource {
terraformResourceType: 'vault_policy',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/provider/index.ts b/src/provider/index.ts
index 3e3305d27..fbe974fb7 100644
--- a/src/provider/index.ts
+++ b/src/provider/index.ts
@@ -896,7 +896,7 @@ export class VaultProvider extends cdktf.TerraformProvider {
terraformResourceType: 'vault',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
terraformProviderSource: 'hashicorp/vault'
diff --git a/src/quota-lease-count/index.ts b/src/quota-lease-count/index.ts
index f57569064..ffc4cdfac 100644
--- a/src/quota-lease-count/index.ts
+++ b/src/quota-lease-count/index.ts
@@ -66,7 +66,7 @@ export class QuotaLeaseCount extends cdktf.TerraformResource {
terraformResourceType: 'vault_quota_lease_count',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/quota-rate-limit/index.ts b/src/quota-rate-limit/index.ts
index 57a11e224..7d8134ce1 100644
--- a/src/quota-rate-limit/index.ts
+++ b/src/quota-rate-limit/index.ts
@@ -78,7 +78,7 @@ export class QuotaRateLimit extends cdktf.TerraformResource {
terraformResourceType: 'vault_quota_rate_limit',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/rabbitmq-secret-backend-role/index.ts b/src/rabbitmq-secret-backend-role/index.ts
index 1141e8ca1..f6a529fb2 100644
--- a/src/rabbitmq-secret-backend-role/index.ts
+++ b/src/rabbitmq-secret-backend-role/index.ts
@@ -525,7 +525,7 @@ export class RabbitmqSecretBackendRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_rabbitmq_secret_backend_role',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/rabbitmq-secret-backend/index.ts b/src/rabbitmq-secret-backend/index.ts
index b700a9312..ae668d837 100644
--- a/src/rabbitmq-secret-backend/index.ts
+++ b/src/rabbitmq-secret-backend/index.ts
@@ -114,7 +114,7 @@ export class RabbitmqSecretBackend extends cdktf.TerraformResource {
terraformResourceType: 'vault_rabbitmq_secret_backend',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/raft-autopilot/index.ts b/src/raft-autopilot/index.ts
index bbf893fed..a26e062c5 100644
--- a/src/raft-autopilot/index.ts
+++ b/src/raft-autopilot/index.ts
@@ -90,7 +90,7 @@ export class RaftAutopilot extends cdktf.TerraformResource {
terraformResourceType: 'vault_raft_autopilot',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/raft-snapshot-agent-config/index.ts b/src/raft-snapshot-agent-config/index.ts
index 1b095bdf3..65694fb46 100644
--- a/src/raft-snapshot-agent-config/index.ts
+++ b/src/raft-snapshot-agent-config/index.ts
@@ -210,7 +210,7 @@ export class RaftSnapshotAgentConfig extends cdktf.TerraformResource {
terraformResourceType: 'vault_raft_snapshot_agent_config',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/rgp-policy/index.ts b/src/rgp-policy/index.ts
index f4b788766..e55ce7680 100644
--- a/src/rgp-policy/index.ts
+++ b/src/rgp-policy/index.ts
@@ -66,7 +66,7 @@ export class RgpPolicy extends cdktf.TerraformResource {
terraformResourceType: 'vault_rgp_policy',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/ssh-secret-backend-ca/index.ts b/src/ssh-secret-backend-ca/index.ts
index 5042c7174..efd7ca740 100644
--- a/src/ssh-secret-backend-ca/index.ts
+++ b/src/ssh-secret-backend-ca/index.ts
@@ -72,7 +72,7 @@ export class SshSecretBackendCa extends cdktf.TerraformResource {
terraformResourceType: 'vault_ssh_secret_backend_ca',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/ssh-secret-backend-role/index.ts b/src/ssh-secret-backend-role/index.ts
index 51aa36b57..e2f3c1887 100644
--- a/src/ssh-secret-backend-role/index.ts
+++ b/src/ssh-secret-backend-role/index.ts
@@ -271,7 +271,7 @@ export class SshSecretBackendRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_ssh_secret_backend_role',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/terraform-cloud-secret-backend/index.ts b/src/terraform-cloud-secret-backend/index.ts
index ab0f30f75..3f915e6ff 100644
--- a/src/terraform-cloud-secret-backend/index.ts
+++ b/src/terraform-cloud-secret-backend/index.ts
@@ -96,7 +96,7 @@ export class TerraformCloudSecretBackend extends cdktf.TerraformResource {
terraformResourceType: 'vault_terraform_cloud_secret_backend',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/terraform-cloud-secret-creds/index.ts b/src/terraform-cloud-secret-creds/index.ts
index a669ec319..5570836e5 100644
--- a/src/terraform-cloud-secret-creds/index.ts
+++ b/src/terraform-cloud-secret-creds/index.ts
@@ -60,7 +60,7 @@ export class TerraformCloudSecretCreds extends cdktf.TerraformResource {
terraformResourceType: 'vault_terraform_cloud_secret_creds',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/terraform-cloud-secret-role/index.ts b/src/terraform-cloud-secret-role/index.ts
index 51a088fb8..3706d057a 100644
--- a/src/terraform-cloud-secret-role/index.ts
+++ b/src/terraform-cloud-secret-role/index.ts
@@ -90,7 +90,7 @@ export class TerraformCloudSecretRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_terraform_cloud_secret_role',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/token-auth-backend-role/index.ts b/src/token-auth-backend-role/index.ts
index 97b7f43c8..55133c9f8 100644
--- a/src/token-auth-backend-role/index.ts
+++ b/src/token-auth-backend-role/index.ts
@@ -156,7 +156,7 @@ export class TokenAuthBackendRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_token_auth_backend_role',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/token/index.ts b/src/token/index.ts
index d5f109766..966e7c44c 100644
--- a/src/token/index.ts
+++ b/src/token/index.ts
@@ -132,7 +132,7 @@ export class Token extends cdktf.TerraformResource {
terraformResourceType: 'vault_token',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/transform-alphabet/index.ts b/src/transform-alphabet/index.ts
index 060f1adba..2b5266dc1 100644
--- a/src/transform-alphabet/index.ts
+++ b/src/transform-alphabet/index.ts
@@ -66,7 +66,7 @@ export class TransformAlphabet extends cdktf.TerraformResource {
terraformResourceType: 'vault_transform_alphabet',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/transform-role/index.ts b/src/transform-role/index.ts
index 65afc22b2..ccc49a253 100644
--- a/src/transform-role/index.ts
+++ b/src/transform-role/index.ts
@@ -66,7 +66,7 @@ export class TransformRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_transform_role',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/transform-template/index.ts b/src/transform-template/index.ts
index 89a7cd4e2..920fe424a 100644
--- a/src/transform-template/index.ts
+++ b/src/transform-template/index.ts
@@ -92,7 +92,7 @@ export class TransformTemplate extends cdktf.TerraformResource {
terraformResourceType: 'vault_transform_template',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/transform-transformation/index.ts b/src/transform-transformation/index.ts
index 68331c8aa..2d13c1c85 100644
--- a/src/transform-transformation/index.ts
+++ b/src/transform-transformation/index.ts
@@ -102,7 +102,7 @@ export class TransformTransformation extends cdktf.TerraformResource {
terraformResourceType: 'vault_transform_transformation',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/transit-secret-backend-key/index.ts b/src/transit-secret-backend-key/index.ts
index c80dce7a7..82e316651 100644
--- a/src/transit-secret-backend-key/index.ts
+++ b/src/transit-secret-backend-key/index.ts
@@ -120,7 +120,7 @@ export class TransitSecretBackendKey extends cdktf.TerraformResource {
terraformResourceType: 'vault_transit_secret_backend_key',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/transit-secret-cache-config/index.ts b/src/transit-secret-cache-config/index.ts
index a177bda3d..ad3652ae2 100644
--- a/src/transit-secret-cache-config/index.ts
+++ b/src/transit-secret-cache-config/index.ts
@@ -60,7 +60,7 @@ export class TransitSecretCacheConfig extends cdktf.TerraformResource {
terraformResourceType: 'vault_transit_secret_cache_config',
terraformGeneratorMetadata: {
providerName: 'vault',
- providerVersion: '3.13.0',
+ providerVersion: '3.14.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
diff --git a/src/version.json b/src/version.json
index b8b2e72ce..2ad50c67d 100644
--- a/src/version.json
+++ b/src/version.json
@@ -1,3 +1,3 @@
{
- "registry.terraform.io/hashicorp/vault": "3.13.0"
+ "registry.terraform.io/hashicorp/vault": "3.14.0"
}