From f78cd0ff1aee3a85ad104055492049bc1ef73668 Mon Sep 17 00:00:00 2001 From: team-tf-cdk <84392119+team-tf-cdk@users.noreply.github.com> Date: Thu, 16 Mar 2023 04:13:04 +0100 Subject: [PATCH] chore: upgrade provider from `3.13.0` to version `3.14.0` (#305) This PR upgrades provider to version 3.14.0 --- docs/API.csharp.md | 2 + docs/API.go.md | 2 + docs/API.java.md | 2 + docs/API.python.md | 2 + docs/API.typescript.md | 2 + docs/auditRequestHeader.csharp.md | 786 +++++++++++++ docs/auditRequestHeader.go.md | 786 +++++++++++++ docs/auditRequestHeader.java.md | 893 ++++++++++++++ docs/auditRequestHeader.python.md | 918 +++++++++++++++ docs/auditRequestHeader.typescript.md | 774 +++++++++++++ docs/gcpSecretImpersonatedAccount.csharp.md | 873 ++++++++++++++ docs/gcpSecretImpersonatedAccount.go.md | 873 ++++++++++++++ docs/gcpSecretImpersonatedAccount.java.md | 1002 ++++++++++++++++ docs/gcpSecretImpersonatedAccount.python.md | 1029 +++++++++++++++++ ...gcpSecretImpersonatedAccount.typescript.md | 859 ++++++++++++++ docs/pkiSecretBackendCrlConfig.csharp.md | 137 ++- docs/pkiSecretBackendCrlConfig.go.md | 135 +++ docs/pkiSecretBackendCrlConfig.java.md | 177 +++ docs/pkiSecretBackendCrlConfig.python.md | 175 ++- docs/pkiSecretBackendCrlConfig.typescript.md | 132 +++ package.json | 2 +- src/ad-secret-backend/index.ts | 2 +- src/ad-secret-library/index.ts | 2 +- src/ad-secret-role/index.ts | 2 +- src/alicloud-auth-backend-role/index.ts | 2 +- src/approle-auth-backend-login/index.ts | 2 +- .../index.ts | 2 +- src/approle-auth-backend-role/index.ts | 2 +- src/audit-request-header/README.md | 3 + src/audit-request-header/index.ts | 157 +++ src/audit/index.ts | 2 +- src/auth-backend/index.ts | 2 +- src/aws-auth-backend-cert/index.ts | 2 +- src/aws-auth-backend-client/index.ts | 2 +- src/aws-auth-backend-config-identity/index.ts | 2 +- .../index.ts | 2 +- src/aws-auth-backend-login/index.ts | 2 +- src/aws-auth-backend-role-tag/index.ts | 2 +- src/aws-auth-backend-role/index.ts | 2 +- .../index.ts | 2 +- src/aws-auth-backend-sts-role/index.ts | 2 +- src/aws-secret-backend-role/index.ts | 2 +- src/aws-secret-backend/index.ts | 2 +- src/azure-auth-backend-config/index.ts | 2 +- src/azure-auth-backend-role/index.ts | 2 +- src/azure-secret-backend-role/index.ts | 2 +- src/azure-secret-backend/index.ts | 2 +- src/cert-auth-backend-role/index.ts | 2 +- src/consul-secret-backend-role/index.ts | 2 +- src/consul-secret-backend/index.ts | 2 +- src/data-vault-ad-access-credentials/index.ts | 2 +- .../index.ts | 2 +- src/data-vault-auth-backend/index.ts | 2 +- .../index.ts | 2 +- .../index.ts | 2 +- src/data-vault-gcp-auth-backend-role/index.ts | 2 +- src/data-vault-generic-secret/index.ts | 2 +- src/data-vault-identity-entity/index.ts | 2 +- src/data-vault-identity-group/index.ts | 2 +- .../index.ts | 2 +- .../index.ts | 2 +- .../index.ts | 2 +- .../index.ts | 2 +- .../index.ts | 2 +- .../index.ts | 2 +- src/data-vault-kv-secret-subkeys-v2/index.ts | 2 +- src/data-vault-kv-secret-v2/index.ts | 2 +- src/data-vault-kv-secret/index.ts | 2 +- src/data-vault-kv-secrets-list-v2/index.ts | 2 +- src/data-vault-kv-secrets-list/index.ts | 2 +- src/data-vault-nomad-access-token/index.ts | 2 +- src/data-vault-policy-document/index.ts | 2 +- src/data-vault-raft-autopilot-state/index.ts | 2 +- src/data-vault-transform-decode/index.ts | 2 +- src/data-vault-transform-encode/index.ts | 2 +- src/data-vault-transit-decrypt/index.ts | 2 +- src/data-vault-transit-encrypt/index.ts | 2 +- .../index.ts | 2 +- src/database-secret-backend-role/index.ts | 2 +- .../index.ts | 2 +- src/database-secrets-mount/index.ts | 2 +- src/egp-policy/index.ts | 2 +- src/gcp-auth-backend-role/index.ts | 2 +- src/gcp-auth-backend/index.ts | 2 +- src/gcp-secret-backend/index.ts | 2 +- src/gcp-secret-impersonated-account/README.md | 3 + src/gcp-secret-impersonated-account/index.ts | 204 ++++ src/gcp-secret-roleset/index.ts | 2 +- src/gcp-secret-static-account/index.ts | 2 +- src/generic-endpoint/index.ts | 2 +- src/generic-secret/index.ts | 2 +- src/github-auth-backend/index.ts | 2 +- src/github-team/index.ts | 2 +- src/github-user/index.ts | 2 +- src/identity-entity-alias/index.ts | 2 +- src/identity-entity-policies/index.ts | 2 +- src/identity-entity/index.ts | 2 +- src/identity-group-alias/index.ts | 2 +- src/identity-group-member-entity-ids/index.ts | 2 +- src/identity-group-member-group-ids/index.ts | 2 +- src/identity-group-policies/index.ts | 2 +- src/identity-group/index.ts | 2 +- src/identity-mfa-duo/index.ts | 2 +- src/identity-mfa-login-enforcement/index.ts | 2 +- src/identity-mfa-okta/index.ts | 2 +- src/identity-mfa-pingid/index.ts | 2 +- src/identity-mfa-totp/index.ts | 2 +- src/identity-oidc-assignment/index.ts | 2 +- src/identity-oidc-client/index.ts | 2 +- .../index.ts | 2 +- src/identity-oidc-key/index.ts | 2 +- src/identity-oidc-provider/index.ts | 2 +- src/identity-oidc-role/index.ts | 2 +- src/identity-oidc-scope/index.ts | 2 +- src/identity-oidc/index.ts | 2 +- src/index.ts | 2 + src/jwt-auth-backend-role/index.ts | 2 +- src/jwt-auth-backend/index.ts | 2 +- src/kmip-secret-backend/index.ts | 2 +- src/kmip-secret-role/index.ts | 2 +- src/kmip-secret-scope/index.ts | 2 +- src/kubernetes-auth-backend-config/index.ts | 2 +- src/kubernetes-auth-backend-role/index.ts | 2 +- src/kubernetes-secret-backend-role/index.ts | 2 +- src/kubernetes-secret-backend/index.ts | 2 +- src/kv-secret-backend-v2/index.ts | 2 +- src/kv-secret-v2/index.ts | 2 +- src/kv-secret/index.ts | 2 +- src/ldap-auth-backend-group/index.ts | 2 +- src/ldap-auth-backend-user/index.ts | 2 +- src/ldap-auth-backend/index.ts | 2 +- src/managed-keys/index.ts | 2 +- src/mfa-duo/index.ts | 2 +- src/mfa-okta/index.ts | 2 +- src/mfa-pingid/index.ts | 2 +- src/mfa-totp/index.ts | 2 +- src/mount/index.ts | 2 +- src/namespace/index.ts | 2 +- src/nomad-secret-backend/index.ts | 2 +- src/nomad-secret-role/index.ts | 2 +- src/okta-auth-backend-group/index.ts | 2 +- src/okta-auth-backend-user/index.ts | 2 +- src/okta-auth-backend/index.ts | 2 +- src/password-policy/index.ts | 2 +- src/pki-secret-backend-cert/index.ts | 2 +- src/pki-secret-backend-config-ca/index.ts | 2 +- src/pki-secret-backend-config-urls/index.ts | 2 +- src/pki-secret-backend-crl-config/index.ts | 74 +- .../index.ts | 2 +- .../index.ts | 2 +- src/pki-secret-backend-role/index.ts | 2 +- src/pki-secret-backend-root-cert/index.ts | 2 +- .../index.ts | 2 +- src/pki-secret-backend-sign/index.ts | 2 +- src/policy/index.ts | 2 +- src/provider/index.ts | 2 +- src/quota-lease-count/index.ts | 2 +- src/quota-rate-limit/index.ts | 2 +- src/rabbitmq-secret-backend-role/index.ts | 2 +- src/rabbitmq-secret-backend/index.ts | 2 +- src/raft-autopilot/index.ts | 2 +- src/raft-snapshot-agent-config/index.ts | 2 +- src/rgp-policy/index.ts | 2 +- src/ssh-secret-backend-ca/index.ts | 2 +- src/ssh-secret-backend-role/index.ts | 2 +- src/terraform-cloud-secret-backend/index.ts | 2 +- src/terraform-cloud-secret-creds/index.ts | 2 +- src/terraform-cloud-secret-role/index.ts | 2 +- src/token-auth-backend-role/index.ts | 2 +- src/token/index.ts | 2 +- src/transform-alphabet/index.ts | 2 +- src/transform-role/index.ts | 2 +- src/transform-template/index.ts | 2 +- src/transform-transformation/index.ts | 2 +- src/transit-secret-backend-key/index.ts | 2 +- src/transit-secret-cache-config/index.ts | 2 +- src/version.json | 2 +- 177 files changed, 10149 insertions(+), 155 deletions(-) create mode 100644 docs/auditRequestHeader.csharp.md create mode 100644 docs/auditRequestHeader.go.md create mode 100644 docs/auditRequestHeader.java.md create mode 100644 docs/auditRequestHeader.python.md create mode 100644 docs/auditRequestHeader.typescript.md create mode 100644 docs/gcpSecretImpersonatedAccount.csharp.md create mode 100644 docs/gcpSecretImpersonatedAccount.go.md create mode 100644 docs/gcpSecretImpersonatedAccount.java.md create mode 100644 docs/gcpSecretImpersonatedAccount.python.md create mode 100644 docs/gcpSecretImpersonatedAccount.typescript.md create mode 100644 src/audit-request-header/README.md create mode 100644 src/audit-request-header/index.ts create mode 100644 src/gcp-secret-impersonated-account/README.md create mode 100644 src/gcp-secret-impersonated-account/index.ts diff --git a/docs/API.csharp.md b/docs/API.csharp.md index 5f7d6a193..4e6c40af3 100644 --- a/docs/API.csharp.md +++ b/docs/API.csharp.md @@ -9,6 +9,7 @@ The following submodules are available: - [approleAuthBackendRole](./approleAuthBackendRole.csharp.md) - [approleAuthBackendRoleSecretId](./approleAuthBackendRoleSecretId.csharp.md) - [audit](./audit.csharp.md) +- [auditRequestHeader](./auditRequestHeader.csharp.md) - [authBackend](./authBackend.csharp.md) - [awsAuthBackendCert](./awsAuthBackendCert.csharp.md) - [awsAuthBackendClient](./awsAuthBackendClient.csharp.md) @@ -63,6 +64,7 @@ The following submodules are available: - [gcpAuthBackend](./gcpAuthBackend.csharp.md) - [gcpAuthBackendRole](./gcpAuthBackendRole.csharp.md) - [gcpSecretBackend](./gcpSecretBackend.csharp.md) +- [gcpSecretImpersonatedAccount](./gcpSecretImpersonatedAccount.csharp.md) - [gcpSecretRoleset](./gcpSecretRoleset.csharp.md) - [gcpSecretStaticAccount](./gcpSecretStaticAccount.csharp.md) - [genericEndpoint](./genericEndpoint.csharp.md) diff --git a/docs/API.go.md b/docs/API.go.md index 1bef9fa50..015f8689b 100644 --- a/docs/API.go.md +++ b/docs/API.go.md @@ -9,6 +9,7 @@ The following submodules are available: - [approleAuthBackendRole](./approleAuthBackendRole.go.md) - [approleAuthBackendRoleSecretId](./approleAuthBackendRoleSecretId.go.md) - [audit](./audit.go.md) +- [auditRequestHeader](./auditRequestHeader.go.md) - [authBackend](./authBackend.go.md) - [awsAuthBackendCert](./awsAuthBackendCert.go.md) - [awsAuthBackendClient](./awsAuthBackendClient.go.md) @@ -63,6 +64,7 @@ The following submodules are available: - [gcpAuthBackend](./gcpAuthBackend.go.md) - [gcpAuthBackendRole](./gcpAuthBackendRole.go.md) - [gcpSecretBackend](./gcpSecretBackend.go.md) +- [gcpSecretImpersonatedAccount](./gcpSecretImpersonatedAccount.go.md) - [gcpSecretRoleset](./gcpSecretRoleset.go.md) - [gcpSecretStaticAccount](./gcpSecretStaticAccount.go.md) - [genericEndpoint](./genericEndpoint.go.md) diff --git a/docs/API.java.md b/docs/API.java.md index 96531b3e2..804397aa1 100644 --- a/docs/API.java.md +++ b/docs/API.java.md @@ -9,6 +9,7 @@ The following submodules are available: - [approleAuthBackendRole](./approleAuthBackendRole.java.md) - [approleAuthBackendRoleSecretId](./approleAuthBackendRoleSecretId.java.md) - [audit](./audit.java.md) +- [auditRequestHeader](./auditRequestHeader.java.md) - [authBackend](./authBackend.java.md) - [awsAuthBackendCert](./awsAuthBackendCert.java.md) - [awsAuthBackendClient](./awsAuthBackendClient.java.md) @@ -63,6 +64,7 @@ The following submodules are available: - [gcpAuthBackend](./gcpAuthBackend.java.md) - [gcpAuthBackendRole](./gcpAuthBackendRole.java.md) - [gcpSecretBackend](./gcpSecretBackend.java.md) +- [gcpSecretImpersonatedAccount](./gcpSecretImpersonatedAccount.java.md) - [gcpSecretRoleset](./gcpSecretRoleset.java.md) - [gcpSecretStaticAccount](./gcpSecretStaticAccount.java.md) - [genericEndpoint](./genericEndpoint.java.md) diff --git a/docs/API.python.md b/docs/API.python.md index f4d4fb106..56fc520bd 100644 --- a/docs/API.python.md +++ b/docs/API.python.md @@ -9,6 +9,7 @@ The following submodules are available: - [approleAuthBackendRole](./approleAuthBackendRole.python.md) - [approleAuthBackendRoleSecretId](./approleAuthBackendRoleSecretId.python.md) - [audit](./audit.python.md) +- [auditRequestHeader](./auditRequestHeader.python.md) - [authBackend](./authBackend.python.md) - [awsAuthBackendCert](./awsAuthBackendCert.python.md) - [awsAuthBackendClient](./awsAuthBackendClient.python.md) @@ -63,6 +64,7 @@ The following submodules are available: - [gcpAuthBackend](./gcpAuthBackend.python.md) - [gcpAuthBackendRole](./gcpAuthBackendRole.python.md) - [gcpSecretBackend](./gcpSecretBackend.python.md) +- [gcpSecretImpersonatedAccount](./gcpSecretImpersonatedAccount.python.md) - [gcpSecretRoleset](./gcpSecretRoleset.python.md) - [gcpSecretStaticAccount](./gcpSecretStaticAccount.python.md) - [genericEndpoint](./genericEndpoint.python.md) diff --git a/docs/API.typescript.md b/docs/API.typescript.md index 158aaa259..0a4026948 100644 --- a/docs/API.typescript.md +++ b/docs/API.typescript.md @@ -9,6 +9,7 @@ The following submodules are available: - [approleAuthBackendRole](./approleAuthBackendRole.typescript.md) - [approleAuthBackendRoleSecretId](./approleAuthBackendRoleSecretId.typescript.md) - [audit](./audit.typescript.md) +- [auditRequestHeader](./auditRequestHeader.typescript.md) - [authBackend](./authBackend.typescript.md) - [awsAuthBackendCert](./awsAuthBackendCert.typescript.md) - [awsAuthBackendClient](./awsAuthBackendClient.typescript.md) @@ -63,6 +64,7 @@ The following submodules are available: - [gcpAuthBackend](./gcpAuthBackend.typescript.md) - [gcpAuthBackendRole](./gcpAuthBackendRole.typescript.md) - [gcpSecretBackend](./gcpSecretBackend.typescript.md) +- [gcpSecretImpersonatedAccount](./gcpSecretImpersonatedAccount.typescript.md) - [gcpSecretRoleset](./gcpSecretRoleset.typescript.md) - [gcpSecretStaticAccount](./gcpSecretStaticAccount.typescript.md) - [genericEndpoint](./genericEndpoint.typescript.md) diff --git a/docs/auditRequestHeader.csharp.md b/docs/auditRequestHeader.csharp.md new file mode 100644 index 000000000..f5c89e47f --- /dev/null +++ b/docs/auditRequestHeader.csharp.md @@ -0,0 +1,786 @@ +# `auditRequestHeader` Submodule + +## Constructs + +### AuditRequestHeader + +Represents a {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header vault_audit_request_header}. + +#### Initializers + +```csharp +using HashiCorp.Cdktf.Providers.Vault; + +new AuditRequestHeader(Construct Scope, string Id, AuditRequestHeaderConfig Config); +``` + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| Scope | Constructs.Construct | The scope in which to define this construct. | +| Id | string | The scoped construct ID. | +| Config | AuditRequestHeaderConfig | *No description.* | + +--- + +##### `Scope`Required + +- *Type:* Constructs.Construct + +The scope in which to define this construct. + +--- + +##### `Id`Required + +- *Type:* string + +The scoped construct ID. + +Must be unique amongst siblings in the same scope + +--- + +##### `Config`Required + +- *Type:* AuditRequestHeaderConfig + +--- + +#### Methods + +| **Name** | **Description** | +| --- | --- | +| ToString | Returns a string representation of this construct. | +| AddOverride | *No description.* | +| OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | +| ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToMetadata | *No description.* | +| ToTerraform | Adds this resource to the terraform JSON output. | +| GetAnyMapAttribute | *No description.* | +| GetBooleanAttribute | *No description.* | +| GetBooleanMapAttribute | *No description.* | +| GetListAttribute | *No description.* | +| GetNumberAttribute | *No description.* | +| GetNumberListAttribute | *No description.* | +| GetNumberMapAttribute | *No description.* | +| GetStringAttribute | *No description.* | +| GetStringMapAttribute | *No description.* | +| InterpolationForAttribute | *No description.* | +| ResetHmac | *No description.* | +| ResetId | *No description.* | +| ResetNamespace | *No description.* | + +--- + +##### `ToString` + +```csharp +private string ToString() +``` + +Returns a string representation of this construct. + +##### `AddOverride` + +```csharp +private void AddOverride(string Path, object Value) +``` + +###### `Path`Required + +- *Type:* string + +--- + +###### `Value`Required + +- *Type:* object + +--- + +##### `OverrideLogicalId` + +```csharp +private void OverrideLogicalId(string NewLogicalId) +``` + +Overrides the auto-generated logical ID with a specific ID. + +###### `NewLogicalId`Required + +- *Type:* string + +The new logical ID to use for this stack element. + +--- + +##### `ResetOverrideLogicalId` + +```csharp +private void ResetOverrideLogicalId() +``` + +Resets a previously passed logical Id to use the auto-generated logical id again. + +##### `ToMetadata` + +```csharp +private object ToMetadata() +``` + +##### `ToTerraform` + +```csharp +private object ToTerraform() +``` + +Adds this resource to the terraform JSON output. + +##### `GetAnyMapAttribute` + +```csharp +private System.Collections.Generic.IDictionary GetAnyMapAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetBooleanAttribute` + +```csharp +private IResolvable GetBooleanAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetBooleanMapAttribute` + +```csharp +private System.Collections.Generic.IDictionary GetBooleanMapAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetListAttribute` + +```csharp +private string[] GetListAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetNumberAttribute` + +```csharp +private double GetNumberAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetNumberListAttribute` + +```csharp +private double[] GetNumberListAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetNumberMapAttribute` + +```csharp +private System.Collections.Generic.IDictionary GetNumberMapAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetStringAttribute` + +```csharp +private string GetStringAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetStringMapAttribute` + +```csharp +private System.Collections.Generic.IDictionary GetStringMapAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `InterpolationForAttribute` + +```csharp +private IResolvable InterpolationForAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `ResetHmac` + +```csharp +private void ResetHmac() +``` + +##### `ResetId` + +```csharp +private void ResetId() +``` + +##### `ResetNamespace` + +```csharp +private void ResetNamespace() +``` + +#### Static Functions + +| **Name** | **Description** | +| --- | --- | +| IsConstruct | Checks if `x` is a construct. | +| IsTerraformElement | *No description.* | +| IsTerraformResource | *No description.* | + +--- + +##### `IsConstruct` + +```csharp +using HashiCorp.Cdktf.Providers.Vault; + +AuditRequestHeader.IsConstruct(object X); +``` + +Checks if `x` is a construct. + +Use this method instead of `instanceof` to properly detect `Construct` +instances, even when the construct library is symlinked. + +Explanation: in JavaScript, multiple copies of the `constructs` library on +disk are seen as independent, completely different libraries. As a +consequence, the class `Construct` in each copy of the `constructs` library +is seen as a different class, and an instance of one class will not test as +`instanceof` the other class. `npm install` will not create installations +like this, but users may manually symlink construct libraries together or +use a monorepo tool: in those cases, multiple copies of the `constructs` +library can be accidentally installed, and `instanceof` will behave +unpredictably. It is safest to avoid using `instanceof`, and using +this type-testing method instead. + +###### `X`Required + +- *Type:* object + +Any object. + +--- + +##### `IsTerraformElement` + +```csharp +using HashiCorp.Cdktf.Providers.Vault; + +AuditRequestHeader.IsTerraformElement(object X); +``` + +###### `X`Required + +- *Type:* object + +--- + +##### `IsTerraformResource` + +```csharp +using HashiCorp.Cdktf.Providers.Vault; + +AuditRequestHeader.IsTerraformResource(object X); +``` + +###### `X`Required + +- *Type:* object + +--- + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| Node | Constructs.Node | The tree node. | +| CdktfStack | HashiCorp.Cdktf.TerraformStack | *No description.* | +| Fqn | string | *No description.* | +| FriendlyUniqueId | string | *No description.* | +| TerraformMetaArguments | System.Collections.Generic.IDictionary | *No description.* | +| TerraformResourceType | string | *No description.* | +| TerraformGeneratorMetadata | HashiCorp.Cdktf.TerraformProviderGeneratorMetadata | *No description.* | +| Connection | object | *No description.* | +| Count | double | *No description.* | +| DependsOn | string[] | *No description.* | +| ForEach | HashiCorp.Cdktf.ITerraformIterator | *No description.* | +| Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | +| Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | +| Provisioners | object[] | *No description.* | +| HmacInput | object | *No description.* | +| IdInput | string | *No description.* | +| NameInput | string | *No description.* | +| NamespaceInput | string | *No description.* | +| Hmac | object | *No description.* | +| Id | string | *No description.* | +| Name | string | *No description.* | +| Namespace | string | *No description.* | + +--- + +##### `Node`Required + +```csharp +public Node Node { get; } +``` + +- *Type:* Constructs.Node + +The tree node. + +--- + +##### `CdktfStack`Required + +```csharp +public TerraformStack CdktfStack { get; } +``` + +- *Type:* HashiCorp.Cdktf.TerraformStack + +--- + +##### `Fqn`Required + +```csharp +public string Fqn { get; } +``` + +- *Type:* string + +--- + +##### `FriendlyUniqueId`Required + +```csharp +public string FriendlyUniqueId { get; } +``` + +- *Type:* string + +--- + +##### `TerraformMetaArguments`Required + +```csharp +public System.Collections.Generic.IDictionary TerraformMetaArguments { get; } +``` + +- *Type:* System.Collections.Generic.IDictionary + +--- + +##### `TerraformResourceType`Required + +```csharp +public string TerraformResourceType { get; } +``` + +- *Type:* string + +--- + +##### `TerraformGeneratorMetadata`Optional + +```csharp +public TerraformProviderGeneratorMetadata TerraformGeneratorMetadata { get; } +``` + +- *Type:* HashiCorp.Cdktf.TerraformProviderGeneratorMetadata + +--- + +##### `Connection`Optional + +```csharp +public object Connection { get; } +``` + +- *Type:* object + +--- + +##### `Count`Optional + +```csharp +public double Count { get; } +``` + +- *Type:* double + +--- + +##### `DependsOn`Optional + +```csharp +public string[] DependsOn { get; } +``` + +- *Type:* string[] + +--- + +##### `ForEach`Optional + +```csharp +public ITerraformIterator ForEach { get; } +``` + +- *Type:* HashiCorp.Cdktf.ITerraformIterator + +--- + +##### `Lifecycle`Optional + +```csharp +public TerraformResourceLifecycle Lifecycle { get; } +``` + +- *Type:* HashiCorp.Cdktf.TerraformResourceLifecycle + +--- + +##### `Provider`Optional + +```csharp +public TerraformProvider Provider { get; } +``` + +- *Type:* HashiCorp.Cdktf.TerraformProvider + +--- + +##### `Provisioners`Optional + +```csharp +public object[] Provisioners { get; } +``` + +- *Type:* object[] + +--- + +##### `HmacInput`Optional + +```csharp +public object HmacInput { get; } +``` + +- *Type:* object + +--- + +##### `IdInput`Optional + +```csharp +public string IdInput { get; } +``` + +- *Type:* string + +--- + +##### `NameInput`Optional + +```csharp +public string NameInput { get; } +``` + +- *Type:* string + +--- + +##### `NamespaceInput`Optional + +```csharp +public string NamespaceInput { get; } +``` + +- *Type:* string + +--- + +##### `Hmac`Required + +```csharp +public object Hmac { get; } +``` + +- *Type:* object + +--- + +##### `Id`Required + +```csharp +public string Id { get; } +``` + +- *Type:* string + +--- + +##### `Name`Required + +```csharp +public string Name { get; } +``` + +- *Type:* string + +--- + +##### `Namespace`Required + +```csharp +public string Namespace { get; } +``` + +- *Type:* string + +--- + +#### Constants + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| TfResourceType | string | *No description.* | + +--- + +##### `TfResourceType`Required + +```csharp +public string TfResourceType { get; } +``` + +- *Type:* string + +--- + +## Structs + +### AuditRequestHeaderConfig + +#### Initializer + +```csharp +using HashiCorp.Cdktf.Providers.Vault; + +new AuditRequestHeaderConfig { + object Connection = null, + double Count = null, + ITerraformDependable[] DependsOn = null, + ITerraformIterator ForEach = null, + TerraformResourceLifecycle Lifecycle = null, + TerraformProvider Provider = null, + object[] Provisioners = null, + string Name, + object Hmac = null, + string Id = null, + string Namespace = null +}; +``` + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| Connection | object | *No description.* | +| Count | double | *No description.* | +| DependsOn | HashiCorp.Cdktf.ITerraformDependable[] | *No description.* | +| ForEach | HashiCorp.Cdktf.ITerraformIterator | *No description.* | +| Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | +| Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | +| Provisioners | object[] | *No description.* | +| Name | string | The name of the request header to audit. | +| Hmac | object | Whether this header's value should be HMAC'd in the audit logs. | +| Id | string | Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id}. | +| Namespace | string | Target namespace. (requires Enterprise). | + +--- + +##### `Connection`Optional + +```csharp +public object Connection { get; set; } +``` + +- *Type:* object + +--- + +##### `Count`Optional + +```csharp +public double Count { get; set; } +``` + +- *Type:* double + +--- + +##### `DependsOn`Optional + +```csharp +public ITerraformDependable[] DependsOn { get; set; } +``` + +- *Type:* HashiCorp.Cdktf.ITerraformDependable[] + +--- + +##### `ForEach`Optional + +```csharp +public ITerraformIterator ForEach { get; set; } +``` + +- *Type:* HashiCorp.Cdktf.ITerraformIterator + +--- + +##### `Lifecycle`Optional + +```csharp +public TerraformResourceLifecycle Lifecycle { get; set; } +``` + +- *Type:* HashiCorp.Cdktf.TerraformResourceLifecycle + +--- + +##### `Provider`Optional + +```csharp +public TerraformProvider Provider { get; set; } +``` + +- *Type:* HashiCorp.Cdktf.TerraformProvider + +--- + +##### `Provisioners`Optional + +```csharp +public object[] Provisioners { get; set; } +``` + +- *Type:* object[] + +--- + +##### `Name`Required + +```csharp +public string Name { get; set; } +``` + +- *Type:* string + +The name of the request header to audit. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#name AuditRequestHeader#name} + +--- + +##### `Hmac`Optional + +```csharp +public object Hmac { get; set; } +``` + +- *Type:* object + +Whether this header's value should be HMAC'd in the audit logs. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#hmac AuditRequestHeader#hmac} + +--- + +##### `Id`Optional + +```csharp +public string Id { get; set; } +``` + +- *Type:* string + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id}. + +Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. +If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + +--- + +##### `Namespace`Optional + +```csharp +public string Namespace { get; set; } +``` + +- *Type:* string + +Target namespace. (requires Enterprise). + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#namespace AuditRequestHeader#namespace} + +--- + + + diff --git a/docs/auditRequestHeader.go.md b/docs/auditRequestHeader.go.md new file mode 100644 index 000000000..d829be391 --- /dev/null +++ b/docs/auditRequestHeader.go.md @@ -0,0 +1,786 @@ +# `auditRequestHeader` Submodule + +## Constructs + +### AuditRequestHeader + +Represents a {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header vault_audit_request_header}. + +#### Initializers + +```go +import "github.com/cdktf/cdktf-provider-vault-go/vault/v5/auditrequestheader" + +auditrequestheader.NewAuditRequestHeader(scope Construct, id *string, config AuditRequestHeaderConfig) AuditRequestHeader +``` + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| scope | github.com/aws/constructs-go/constructs/v10.Construct | The scope in which to define this construct. | +| id | *string | The scoped construct ID. | +| config | AuditRequestHeaderConfig | *No description.* | + +--- + +##### `scope`Required + +- *Type:* github.com/aws/constructs-go/constructs/v10.Construct + +The scope in which to define this construct. + +--- + +##### `id`Required + +- *Type:* *string + +The scoped construct ID. + +Must be unique amongst siblings in the same scope + +--- + +##### `config`Required + +- *Type:* AuditRequestHeaderConfig + +--- + +#### Methods + +| **Name** | **Description** | +| --- | --- | +| ToString | Returns a string representation of this construct. | +| AddOverride | *No description.* | +| OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | +| ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToMetadata | *No description.* | +| ToTerraform | Adds this resource to the terraform JSON output. | +| GetAnyMapAttribute | *No description.* | +| GetBooleanAttribute | *No description.* | +| GetBooleanMapAttribute | *No description.* | +| GetListAttribute | *No description.* | +| GetNumberAttribute | *No description.* | +| GetNumberListAttribute | *No description.* | +| GetNumberMapAttribute | *No description.* | +| GetStringAttribute | *No description.* | +| GetStringMapAttribute | *No description.* | +| InterpolationForAttribute | *No description.* | +| ResetHmac | *No description.* | +| ResetId | *No description.* | +| ResetNamespace | *No description.* | + +--- + +##### `ToString` + +```go +func ToString() *string +``` + +Returns a string representation of this construct. + +##### `AddOverride` + +```go +func AddOverride(path *string, value interface{}) +``` + +###### `path`Required + +- *Type:* *string + +--- + +###### `value`Required + +- *Type:* interface{} + +--- + +##### `OverrideLogicalId` + +```go +func OverrideLogicalId(newLogicalId *string) +``` + +Overrides the auto-generated logical ID with a specific ID. + +###### `newLogicalId`Required + +- *Type:* *string + +The new logical ID to use for this stack element. + +--- + +##### `ResetOverrideLogicalId` + +```go +func ResetOverrideLogicalId() +``` + +Resets a previously passed logical Id to use the auto-generated logical id again. + +##### `ToMetadata` + +```go +func ToMetadata() interface{} +``` + +##### `ToTerraform` + +```go +func ToTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + +##### `GetAnyMapAttribute` + +```go +func GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetBooleanAttribute` + +```go +func GetBooleanAttribute(terraformAttribute *string) IResolvable +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetBooleanMapAttribute` + +```go +func GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetListAttribute` + +```go +func GetListAttribute(terraformAttribute *string) *[]*string +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetNumberAttribute` + +```go +func GetNumberAttribute(terraformAttribute *string) *f64 +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetNumberListAttribute` + +```go +func GetNumberListAttribute(terraformAttribute *string) *[]*f64 +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetNumberMapAttribute` + +```go +func GetNumberMapAttribute(terraformAttribute *string) *map[string]*f64 +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetStringAttribute` + +```go +func GetStringAttribute(terraformAttribute *string) *string +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetStringMapAttribute` + +```go +func GetStringMapAttribute(terraformAttribute *string) *map[string]*string +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `InterpolationForAttribute` + +```go +func InterpolationForAttribute(terraformAttribute *string) IResolvable +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `ResetHmac` + +```go +func ResetHmac() +``` + +##### `ResetId` + +```go +func ResetId() +``` + +##### `ResetNamespace` + +```go +func ResetNamespace() +``` + +#### Static Functions + +| **Name** | **Description** | +| --- | --- | +| IsConstruct | Checks if `x` is a construct. | +| IsTerraformElement | *No description.* | +| IsTerraformResource | *No description.* | + +--- + +##### `IsConstruct` + +```go +import "github.com/cdktf/cdktf-provider-vault-go/vault/v5/auditrequestheader" + +auditrequestheader.AuditRequestHeader_IsConstruct(x interface{}) *bool +``` + +Checks if `x` is a construct. + +Use this method instead of `instanceof` to properly detect `Construct` +instances, even when the construct library is symlinked. + +Explanation: in JavaScript, multiple copies of the `constructs` library on +disk are seen as independent, completely different libraries. As a +consequence, the class `Construct` in each copy of the `constructs` library +is seen as a different class, and an instance of one class will not test as +`instanceof` the other class. `npm install` will not create installations +like this, but users may manually symlink construct libraries together or +use a monorepo tool: in those cases, multiple copies of the `constructs` +library can be accidentally installed, and `instanceof` will behave +unpredictably. It is safest to avoid using `instanceof`, and using +this type-testing method instead. + +###### `x`Required + +- *Type:* interface{} + +Any object. + +--- + +##### `IsTerraformElement` + +```go +import "github.com/cdktf/cdktf-provider-vault-go/vault/v5/auditrequestheader" + +auditrequestheader.AuditRequestHeader_IsTerraformElement(x interface{}) *bool +``` + +###### `x`Required + +- *Type:* interface{} + +--- + +##### `IsTerraformResource` + +```go +import "github.com/cdktf/cdktf-provider-vault-go/vault/v5/auditrequestheader" + +auditrequestheader.AuditRequestHeader_IsTerraformResource(x interface{}) *bool +``` + +###### `x`Required + +- *Type:* interface{} + +--- + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| Node | github.com/aws/constructs-go/constructs/v10.Node | The tree node. | +| CdktfStack | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformStack | *No description.* | +| Fqn | *string | *No description.* | +| FriendlyUniqueId | *string | *No description.* | +| TerraformMetaArguments | *map[string]interface{} | *No description.* | +| TerraformResourceType | *string | *No description.* | +| TerraformGeneratorMetadata | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProviderGeneratorMetadata | *No description.* | +| Connection | interface{} | *No description.* | +| Count | *f64 | *No description.* | +| DependsOn | *[]*string | *No description.* | +| ForEach | github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator | *No description.* | +| Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | +| Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | +| Provisioners | *[]interface{} | *No description.* | +| HmacInput | interface{} | *No description.* | +| IdInput | *string | *No description.* | +| NameInput | *string | *No description.* | +| NamespaceInput | *string | *No description.* | +| Hmac | interface{} | *No description.* | +| Id | *string | *No description.* | +| Name | *string | *No description.* | +| Namespace | *string | *No description.* | + +--- + +##### `Node`Required + +```go +func Node() Node +``` + +- *Type:* github.com/aws/constructs-go/constructs/v10.Node + +The tree node. + +--- + +##### `CdktfStack`Required + +```go +func CdktfStack() TerraformStack +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformStack + +--- + +##### `Fqn`Required + +```go +func Fqn() *string +``` + +- *Type:* *string + +--- + +##### `FriendlyUniqueId`Required + +```go +func FriendlyUniqueId() *string +``` + +- *Type:* *string + +--- + +##### `TerraformMetaArguments`Required + +```go +func TerraformMetaArguments() *map[string]interface{} +``` + +- *Type:* *map[string]interface{} + +--- + +##### `TerraformResourceType`Required + +```go +func TerraformResourceType() *string +``` + +- *Type:* *string + +--- + +##### `TerraformGeneratorMetadata`Optional + +```go +func TerraformGeneratorMetadata() TerraformProviderGeneratorMetadata +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProviderGeneratorMetadata + +--- + +##### `Connection`Optional + +```go +func Connection() interface{} +``` + +- *Type:* interface{} + +--- + +##### `Count`Optional + +```go +func Count() *f64 +``` + +- *Type:* *f64 + +--- + +##### `DependsOn`Optional + +```go +func DependsOn() *[]*string +``` + +- *Type:* *[]*string + +--- + +##### `ForEach`Optional + +```go +func ForEach() ITerraformIterator +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator + +--- + +##### `Lifecycle`Optional + +```go +func Lifecycle() TerraformResourceLifecycle +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle + +--- + +##### `Provider`Optional + +```go +func Provider() TerraformProvider +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider + +--- + +##### `Provisioners`Optional + +```go +func Provisioners() *[]interface{} +``` + +- *Type:* *[]interface{} + +--- + +##### `HmacInput`Optional + +```go +func HmacInput() interface{} +``` + +- *Type:* interface{} + +--- + +##### `IdInput`Optional + +```go +func IdInput() *string +``` + +- *Type:* *string + +--- + +##### `NameInput`Optional + +```go +func NameInput() *string +``` + +- *Type:* *string + +--- + +##### `NamespaceInput`Optional + +```go +func NamespaceInput() *string +``` + +- *Type:* *string + +--- + +##### `Hmac`Required + +```go +func Hmac() interface{} +``` + +- *Type:* interface{} + +--- + +##### `Id`Required + +```go +func Id() *string +``` + +- *Type:* *string + +--- + +##### `Name`Required + +```go +func Name() *string +``` + +- *Type:* *string + +--- + +##### `Namespace`Required + +```go +func Namespace() *string +``` + +- *Type:* *string + +--- + +#### Constants + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| TfResourceType | *string | *No description.* | + +--- + +##### `TfResourceType`Required + +```go +func TfResourceType() *string +``` + +- *Type:* *string + +--- + +## Structs + +### AuditRequestHeaderConfig + +#### Initializer + +```go +import "github.com/cdktf/cdktf-provider-vault-go/vault/v5/auditrequestheader" + +&auditrequestheader.AuditRequestHeaderConfig { + Connection: interface{}, + Count: *f64, + DependsOn: *[]github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformDependable, + ForEach: github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator, + Lifecycle: github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle, + Provider: github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider, + Provisioners: *[]interface{}, + Name: *string, + Hmac: interface{}, + Id: *string, + Namespace: *string, +} +``` + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| Connection | interface{} | *No description.* | +| Count | *f64 | *No description.* | +| DependsOn | *[]github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformDependable | *No description.* | +| ForEach | github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator | *No description.* | +| Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | +| Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | +| Provisioners | *[]interface{} | *No description.* | +| Name | *string | The name of the request header to audit. | +| Hmac | interface{} | Whether this header's value should be HMAC'd in the audit logs. | +| Id | *string | Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id}. | +| Namespace | *string | Target namespace. (requires Enterprise). | + +--- + +##### `Connection`Optional + +```go +Connection interface{} +``` + +- *Type:* interface{} + +--- + +##### `Count`Optional + +```go +Count *f64 +``` + +- *Type:* *f64 + +--- + +##### `DependsOn`Optional + +```go +DependsOn *[]ITerraformDependable +``` + +- *Type:* *[]github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformDependable + +--- + +##### `ForEach`Optional + +```go +ForEach ITerraformIterator +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator + +--- + +##### `Lifecycle`Optional + +```go +Lifecycle TerraformResourceLifecycle +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle + +--- + +##### `Provider`Optional + +```go +Provider TerraformProvider +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider + +--- + +##### `Provisioners`Optional + +```go +Provisioners *[]interface{} +``` + +- *Type:* *[]interface{} + +--- + +##### `Name`Required + +```go +Name *string +``` + +- *Type:* *string + +The name of the request header to audit. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#name AuditRequestHeader#name} + +--- + +##### `Hmac`Optional + +```go +Hmac interface{} +``` + +- *Type:* interface{} + +Whether this header's value should be HMAC'd in the audit logs. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#hmac AuditRequestHeader#hmac} + +--- + +##### `Id`Optional + +```go +Id *string +``` + +- *Type:* *string + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id}. + +Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. +If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + +--- + +##### `Namespace`Optional + +```go +Namespace *string +``` + +- *Type:* *string + +Target namespace. (requires Enterprise). + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#namespace AuditRequestHeader#namespace} + +--- + + + diff --git a/docs/auditRequestHeader.java.md b/docs/auditRequestHeader.java.md new file mode 100644 index 000000000..5036e23f6 --- /dev/null +++ b/docs/auditRequestHeader.java.md @@ -0,0 +1,893 @@ +# `auditRequestHeader` Submodule + +## Constructs + +### AuditRequestHeader + +Represents a {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header vault_audit_request_header}. + +#### Initializers + +```java +import com.hashicorp.cdktf.providers.vault.audit_request_header.AuditRequestHeader; + +AuditRequestHeader.Builder.create(Construct scope, java.lang.String id) +// .connection(SSHProvisionerConnection) +// .connection(WinrmProvisionerConnection) +// .count(java.lang.Number) +// .dependsOn(java.util.List) +// .forEach(ITerraformIterator) +// .lifecycle(TerraformResourceLifecycle) +// .provider(TerraformProvider) +// .provisioners(java.util.List) + .name(java.lang.String) +// .hmac(java.lang.Boolean) +// .hmac(IResolvable) +// .id(java.lang.String) +// .namespace(java.lang.String) + .build(); +``` + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| scope | software.constructs.Construct | The scope in which to define this construct. | +| id | java.lang.String | The scoped construct ID. | +| connection | com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection | *No description.* | +| count | java.lang.Number | *No description.* | +| dependsOn | java.util.List | *No description.* | +| forEach | com.hashicorp.cdktf.ITerraformIterator | *No description.* | +| lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | +| provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | +| provisioners | java.util.List | *No description.* | +| name | java.lang.String | The name of the request header to audit. | +| hmac | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Whether this header's value should be HMAC'd in the audit logs. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id}. | +| namespace | java.lang.String | Target namespace. (requires Enterprise). | + +--- + +##### `scope`Required + +- *Type:* software.constructs.Construct + +The scope in which to define this construct. + +--- + +##### `id`Required + +- *Type:* java.lang.String + +The scoped construct ID. + +Must be unique amongst siblings in the same scope + +--- + +##### `connection`Optional + +- *Type:* com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection + +--- + +##### `count`Optional + +- *Type:* java.lang.Number + +--- + +##### `dependsOn`Optional + +- *Type:* java.util.List + +--- + +##### `forEach`Optional + +- *Type:* com.hashicorp.cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +- *Type:* com.hashicorp.cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +- *Type:* com.hashicorp.cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +- *Type:* java.util.List + +--- + +##### `name`Required + +- *Type:* java.lang.String + +The name of the request header to audit. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#name AuditRequestHeader#name} + +--- + +##### `hmac`Optional + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +Whether this header's value should be HMAC'd in the audit logs. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#hmac AuditRequestHeader#hmac} + +--- + +##### `id`Optional + +- *Type:* java.lang.String + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id}. + +Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. +If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + +--- + +##### `namespace`Optional + +- *Type:* java.lang.String + +Target namespace. (requires Enterprise). + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#namespace AuditRequestHeader#namespace} + +--- + +#### Methods + +| **Name** | **Description** | +| --- | --- | +| toString | Returns a string representation of this construct. | +| addOverride | *No description.* | +| overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | +| resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toMetadata | *No description.* | +| toTerraform | Adds this resource to the terraform JSON output. | +| getAnyMapAttribute | *No description.* | +| getBooleanAttribute | *No description.* | +| getBooleanMapAttribute | *No description.* | +| getListAttribute | *No description.* | +| getNumberAttribute | *No description.* | +| getNumberListAttribute | *No description.* | +| getNumberMapAttribute | *No description.* | +| getStringAttribute | *No description.* | +| getStringMapAttribute | *No description.* | +| interpolationForAttribute | *No description.* | +| resetHmac | *No description.* | +| resetId | *No description.* | +| resetNamespace | *No description.* | + +--- + +##### `toString` + +```java +public java.lang.String toString() +``` + +Returns a string representation of this construct. + +##### `addOverride` + +```java +public void addOverride(java.lang.String path, java.lang.Object value) +``` + +###### `path`Required + +- *Type:* java.lang.String + +--- + +###### `value`Required + +- *Type:* java.lang.Object + +--- + +##### `overrideLogicalId` + +```java +public void overrideLogicalId(java.lang.String newLogicalId) +``` + +Overrides the auto-generated logical ID with a specific ID. + +###### `newLogicalId`Required + +- *Type:* java.lang.String + +The new logical ID to use for this stack element. + +--- + +##### `resetOverrideLogicalId` + +```java +public void resetOverrideLogicalId() +``` + +Resets a previously passed logical Id to use the auto-generated logical id again. + +##### `toMetadata` + +```java +public java.lang.Object toMetadata() +``` + +##### `toTerraform` + +```java +public java.lang.Object toTerraform() +``` + +Adds this resource to the terraform JSON output. + +##### `getAnyMapAttribute` + +```java +public java.util.Map getAnyMapAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getBooleanAttribute` + +```java +public IResolvable getBooleanAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getBooleanMapAttribute` + +```java +public java.util.Map getBooleanMapAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getListAttribute` + +```java +public java.util.List getListAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getNumberAttribute` + +```java +public java.lang.Number getNumberAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getNumberListAttribute` + +```java +public java.util.List getNumberListAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getNumberMapAttribute` + +```java +public java.util.Map getNumberMapAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getStringAttribute` + +```java +public java.lang.String getStringAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getStringMapAttribute` + +```java +public java.util.Map getStringMapAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `interpolationForAttribute` + +```java +public IResolvable interpolationForAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `resetHmac` + +```java +public void resetHmac() +``` + +##### `resetId` + +```java +public void resetId() +``` + +##### `resetNamespace` + +```java +public void resetNamespace() +``` + +#### Static Functions + +| **Name** | **Description** | +| --- | --- | +| isConstruct | Checks if `x` is a construct. | +| isTerraformElement | *No description.* | +| isTerraformResource | *No description.* | + +--- + +##### `isConstruct` + +```java +import com.hashicorp.cdktf.providers.vault.audit_request_header.AuditRequestHeader; + +AuditRequestHeader.isConstruct(java.lang.Object x) +``` + +Checks if `x` is a construct. + +Use this method instead of `instanceof` to properly detect `Construct` +instances, even when the construct library is symlinked. + +Explanation: in JavaScript, multiple copies of the `constructs` library on +disk are seen as independent, completely different libraries. As a +consequence, the class `Construct` in each copy of the `constructs` library +is seen as a different class, and an instance of one class will not test as +`instanceof` the other class. `npm install` will not create installations +like this, but users may manually symlink construct libraries together or +use a monorepo tool: in those cases, multiple copies of the `constructs` +library can be accidentally installed, and `instanceof` will behave +unpredictably. It is safest to avoid using `instanceof`, and using +this type-testing method instead. + +###### `x`Required + +- *Type:* java.lang.Object + +Any object. + +--- + +##### `isTerraformElement` + +```java +import com.hashicorp.cdktf.providers.vault.audit_request_header.AuditRequestHeader; + +AuditRequestHeader.isTerraformElement(java.lang.Object x) +``` + +###### `x`Required + +- *Type:* java.lang.Object + +--- + +##### `isTerraformResource` + +```java +import com.hashicorp.cdktf.providers.vault.audit_request_header.AuditRequestHeader; + +AuditRequestHeader.isTerraformResource(java.lang.Object x) +``` + +###### `x`Required + +- *Type:* java.lang.Object + +--- + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| node | software.constructs.Node | The tree node. | +| cdktfStack | com.hashicorp.cdktf.TerraformStack | *No description.* | +| fqn | java.lang.String | *No description.* | +| friendlyUniqueId | java.lang.String | *No description.* | +| terraformMetaArguments | java.util.Map | *No description.* | +| terraformResourceType | java.lang.String | *No description.* | +| terraformGeneratorMetadata | com.hashicorp.cdktf.TerraformProviderGeneratorMetadata | *No description.* | +| connection | com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection | *No description.* | +| count | java.lang.Number | *No description.* | +| dependsOn | java.util.List | *No description.* | +| forEach | com.hashicorp.cdktf.ITerraformIterator | *No description.* | +| lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | +| provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | +| provisioners | java.util.List | *No description.* | +| hmacInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | +| idInput | java.lang.String | *No description.* | +| nameInput | java.lang.String | *No description.* | +| namespaceInput | java.lang.String | *No description.* | +| hmac | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | +| id | java.lang.String | *No description.* | +| name | java.lang.String | *No description.* | +| namespace | java.lang.String | *No description.* | + +--- + +##### `node`Required + +```java +public Node getNode(); +``` + +- *Type:* software.constructs.Node + +The tree node. + +--- + +##### `cdktfStack`Required + +```java +public TerraformStack getCdktfStack(); +``` + +- *Type:* com.hashicorp.cdktf.TerraformStack + +--- + +##### `fqn`Required + +```java +public java.lang.String getFqn(); +``` + +- *Type:* java.lang.String + +--- + +##### `friendlyUniqueId`Required + +```java +public java.lang.String getFriendlyUniqueId(); +``` + +- *Type:* java.lang.String + +--- + +##### `terraformMetaArguments`Required + +```java +public java.util.Map getTerraformMetaArguments(); +``` + +- *Type:* java.util.Map + +--- + +##### `terraformResourceType`Required + +```java +public java.lang.String getTerraformResourceType(); +``` + +- *Type:* java.lang.String + +--- + +##### `terraformGeneratorMetadata`Optional + +```java +public TerraformProviderGeneratorMetadata getTerraformGeneratorMetadata(); +``` + +- *Type:* com.hashicorp.cdktf.TerraformProviderGeneratorMetadata + +--- + +##### `connection`Optional + +```java +public java.lang.Object getConnection(); +``` + +- *Type:* com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection + +--- + +##### `count`Optional + +```java +public java.lang.Number getCount(); +``` + +- *Type:* java.lang.Number + +--- + +##### `dependsOn`Optional + +```java +public java.util.List getDependsOn(); +``` + +- *Type:* java.util.List + +--- + +##### `forEach`Optional + +```java +public ITerraformIterator getForEach(); +``` + +- *Type:* com.hashicorp.cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +```java +public TerraformResourceLifecycle getLifecycle(); +``` + +- *Type:* com.hashicorp.cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +```java +public TerraformProvider getProvider(); +``` + +- *Type:* com.hashicorp.cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +```java +public java.lang.Object getProvisioners(); +``` + +- *Type:* java.util.List + +--- + +##### `hmacInput`Optional + +```java +public java.lang.Object getHmacInput(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +--- + +##### `idInput`Optional + +```java +public java.lang.String getIdInput(); +``` + +- *Type:* java.lang.String + +--- + +##### `nameInput`Optional + +```java +public java.lang.String getNameInput(); +``` + +- *Type:* java.lang.String + +--- + +##### `namespaceInput`Optional + +```java +public java.lang.String getNamespaceInput(); +``` + +- *Type:* java.lang.String + +--- + +##### `hmac`Required + +```java +public java.lang.Object getHmac(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +--- + +##### `id`Required + +```java +public java.lang.String getId(); +``` + +- *Type:* java.lang.String + +--- + +##### `name`Required + +```java +public java.lang.String getName(); +``` + +- *Type:* java.lang.String + +--- + +##### `namespace`Required + +```java +public java.lang.String getNamespace(); +``` + +- *Type:* java.lang.String + +--- + +#### Constants + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| tfResourceType | java.lang.String | *No description.* | + +--- + +##### `tfResourceType`Required + +```java +public java.lang.String getTfResourceType(); +``` + +- *Type:* java.lang.String + +--- + +## Structs + +### AuditRequestHeaderConfig + +#### Initializer + +```java +import com.hashicorp.cdktf.providers.vault.audit_request_header.AuditRequestHeaderConfig; + +AuditRequestHeaderConfig.builder() +// .connection(SSHProvisionerConnection) +// .connection(WinrmProvisionerConnection) +// .count(java.lang.Number) +// .dependsOn(java.util.List) +// .forEach(ITerraformIterator) +// .lifecycle(TerraformResourceLifecycle) +// .provider(TerraformProvider) +// .provisioners(java.util.List) + .name(java.lang.String) +// .hmac(java.lang.Boolean) +// .hmac(IResolvable) +// .id(java.lang.String) +// .namespace(java.lang.String) + .build(); +``` + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| connection | com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection | *No description.* | +| count | java.lang.Number | *No description.* | +| dependsOn | java.util.List | *No description.* | +| forEach | com.hashicorp.cdktf.ITerraformIterator | *No description.* | +| lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | +| provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | +| provisioners | java.util.List | *No description.* | +| name | java.lang.String | The name of the request header to audit. | +| hmac | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Whether this header's value should be HMAC'd in the audit logs. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id}. | +| namespace | java.lang.String | Target namespace. (requires Enterprise). | + +--- + +##### `connection`Optional + +```java +public java.lang.Object getConnection(); +``` + +- *Type:* com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection + +--- + +##### `count`Optional + +```java +public java.lang.Number getCount(); +``` + +- *Type:* java.lang.Number + +--- + +##### `dependsOn`Optional + +```java +public java.util.List getDependsOn(); +``` + +- *Type:* java.util.List + +--- + +##### `forEach`Optional + +```java +public ITerraformIterator getForEach(); +``` + +- *Type:* com.hashicorp.cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +```java +public TerraformResourceLifecycle getLifecycle(); +``` + +- *Type:* com.hashicorp.cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +```java +public TerraformProvider getProvider(); +``` + +- *Type:* com.hashicorp.cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +```java +public java.lang.Object getProvisioners(); +``` + +- *Type:* java.util.List + +--- + +##### `name`Required + +```java +public java.lang.String getName(); +``` + +- *Type:* java.lang.String + +The name of the request header to audit. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#name AuditRequestHeader#name} + +--- + +##### `hmac`Optional + +```java +public java.lang.Object getHmac(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +Whether this header's value should be HMAC'd in the audit logs. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#hmac AuditRequestHeader#hmac} + +--- + +##### `id`Optional + +```java +public java.lang.String getId(); +``` + +- *Type:* java.lang.String + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id}. + +Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. +If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + +--- + +##### `namespace`Optional + +```java +public java.lang.String getNamespace(); +``` + +- *Type:* java.lang.String + +Target namespace. (requires Enterprise). + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#namespace AuditRequestHeader#namespace} + +--- + + + diff --git a/docs/auditRequestHeader.python.md b/docs/auditRequestHeader.python.md new file mode 100644 index 000000000..51d8f182a --- /dev/null +++ b/docs/auditRequestHeader.python.md @@ -0,0 +1,918 @@ +# `auditRequestHeader` Submodule + +## Constructs + +### AuditRequestHeader + +Represents a {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header vault_audit_request_header}. + +#### Initializers + +```python +from cdktf_cdktf_provider_vault import audit_request_header + +auditRequestHeader.AuditRequestHeader( + scope: Construct, + id: str, + connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection] = None, + count: typing.Union[int, float] = None, + depends_on: typing.List[ITerraformDependable] = None, + for_each: ITerraformIterator = None, + lifecycle: TerraformResourceLifecycle = None, + provider: TerraformProvider = None, + provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]] = None, + name: str, + hmac: typing.Union[bool, IResolvable] = None, + id: str = None, + namespace: str = None +) +``` + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| scope | constructs.Construct | The scope in which to define this construct. | +| id | str | The scoped construct ID. | +| connection | typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] | *No description.* | +| count | typing.Union[int, float] | *No description.* | +| depends_on | typing.List[cdktf.ITerraformDependable] | *No description.* | +| for_each | cdktf.ITerraformIterator | *No description.* | +| lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | +| provider | cdktf.TerraformProvider | *No description.* | +| provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | +| name | str | The name of the request header to audit. | +| hmac | typing.Union[bool, cdktf.IResolvable] | Whether this header's value should be HMAC'd in the audit logs. | +| id | str | Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id}. | +| namespace | str | Target namespace. (requires Enterprise). | + +--- + +##### `scope`Required + +- *Type:* constructs.Construct + +The scope in which to define this construct. + +--- + +##### `id`Required + +- *Type:* str + +The scoped construct ID. + +Must be unique amongst siblings in the same scope + +--- + +##### `connection`Optional + +- *Type:* typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] + +--- + +##### `count`Optional + +- *Type:* typing.Union[int, float] + +--- + +##### `depends_on`Optional + +- *Type:* typing.List[cdktf.ITerraformDependable] + +--- + +##### `for_each`Optional + +- *Type:* cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +- *Type:* cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +- *Type:* cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +- *Type:* typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] + +--- + +##### `name`Required + +- *Type:* str + +The name of the request header to audit. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#name AuditRequestHeader#name} + +--- + +##### `hmac`Optional + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +Whether this header's value should be HMAC'd in the audit logs. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#hmac AuditRequestHeader#hmac} + +--- + +##### `id`Optional + +- *Type:* str + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id}. + +Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. +If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + +--- + +##### `namespace`Optional + +- *Type:* str + +Target namespace. (requires Enterprise). + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#namespace AuditRequestHeader#namespace} + +--- + +#### Methods + +| **Name** | **Description** | +| --- | --- | +| to_string | Returns a string representation of this construct. | +| add_override | *No description.* | +| override_logical_id | Overrides the auto-generated logical ID with a specific ID. | +| reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_metadata | *No description.* | +| to_terraform | Adds this resource to the terraform JSON output. | +| get_any_map_attribute | *No description.* | +| get_boolean_attribute | *No description.* | +| get_boolean_map_attribute | *No description.* | +| get_list_attribute | *No description.* | +| get_number_attribute | *No description.* | +| get_number_list_attribute | *No description.* | +| get_number_map_attribute | *No description.* | +| get_string_attribute | *No description.* | +| get_string_map_attribute | *No description.* | +| interpolation_for_attribute | *No description.* | +| reset_hmac | *No description.* | +| reset_id | *No description.* | +| reset_namespace | *No description.* | + +--- + +##### `to_string` + +```python +def to_string() -> str +``` + +Returns a string representation of this construct. + +##### `add_override` + +```python +def add_override( + path: str, + value: typing.Any +) -> None +``` + +###### `path`Required + +- *Type:* str + +--- + +###### `value`Required + +- *Type:* typing.Any + +--- + +##### `override_logical_id` + +```python +def override_logical_id( + new_logical_id: str +) -> None +``` + +Overrides the auto-generated logical ID with a specific ID. + +###### `new_logical_id`Required + +- *Type:* str + +The new logical ID to use for this stack element. + +--- + +##### `reset_override_logical_id` + +```python +def reset_override_logical_id() -> None +``` + +Resets a previously passed logical Id to use the auto-generated logical id again. + +##### `to_metadata` + +```python +def to_metadata() -> typing.Any +``` + +##### `to_terraform` + +```python +def to_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + +##### `get_any_map_attribute` + +```python +def get_any_map_attribute( + terraform_attribute: str +) -> typing.Mapping[typing.Any] +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_boolean_attribute` + +```python +def get_boolean_attribute( + terraform_attribute: str +) -> IResolvable +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_boolean_map_attribute` + +```python +def get_boolean_map_attribute( + terraform_attribute: str +) -> typing.Mapping[bool] +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_list_attribute` + +```python +def get_list_attribute( + terraform_attribute: str +) -> typing.List[str] +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_number_attribute` + +```python +def get_number_attribute( + terraform_attribute: str +) -> typing.Union[int, float] +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_number_list_attribute` + +```python +def get_number_list_attribute( + terraform_attribute: str +) -> typing.List[typing.Union[int, float]] +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_number_map_attribute` + +```python +def get_number_map_attribute( + terraform_attribute: str +) -> typing.Mapping[typing.Union[int, float]] +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_string_attribute` + +```python +def get_string_attribute( + terraform_attribute: str +) -> str +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_string_map_attribute` + +```python +def get_string_map_attribute( + terraform_attribute: str +) -> typing.Mapping[str] +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `interpolation_for_attribute` + +```python +def interpolation_for_attribute( + terraform_attribute: str +) -> IResolvable +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `reset_hmac` + +```python +def reset_hmac() -> None +``` + +##### `reset_id` + +```python +def reset_id() -> None +``` + +##### `reset_namespace` + +```python +def reset_namespace() -> None +``` + +#### Static Functions + +| **Name** | **Description** | +| --- | --- | +| is_construct | Checks if `x` is a construct. | +| is_terraform_element | *No description.* | +| is_terraform_resource | *No description.* | + +--- + +##### `is_construct` + +```python +from cdktf_cdktf_provider_vault import audit_request_header + +auditRequestHeader.AuditRequestHeader.is_construct( + x: typing.Any +) +``` + +Checks if `x` is a construct. + +Use this method instead of `instanceof` to properly detect `Construct` +instances, even when the construct library is symlinked. + +Explanation: in JavaScript, multiple copies of the `constructs` library on +disk are seen as independent, completely different libraries. As a +consequence, the class `Construct` in each copy of the `constructs` library +is seen as a different class, and an instance of one class will not test as +`instanceof` the other class. `npm install` will not create installations +like this, but users may manually symlink construct libraries together or +use a monorepo tool: in those cases, multiple copies of the `constructs` +library can be accidentally installed, and `instanceof` will behave +unpredictably. It is safest to avoid using `instanceof`, and using +this type-testing method instead. + +###### `x`Required + +- *Type:* typing.Any + +Any object. + +--- + +##### `is_terraform_element` + +```python +from cdktf_cdktf_provider_vault import audit_request_header + +auditRequestHeader.AuditRequestHeader.is_terraform_element( + x: typing.Any +) +``` + +###### `x`Required + +- *Type:* typing.Any + +--- + +##### `is_terraform_resource` + +```python +from cdktf_cdktf_provider_vault import audit_request_header + +auditRequestHeader.AuditRequestHeader.is_terraform_resource( + x: typing.Any +) +``` + +###### `x`Required + +- *Type:* typing.Any + +--- + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| node | constructs.Node | The tree node. | +| cdktf_stack | cdktf.TerraformStack | *No description.* | +| fqn | str | *No description.* | +| friendly_unique_id | str | *No description.* | +| terraform_meta_arguments | typing.Mapping[typing.Any] | *No description.* | +| terraform_resource_type | str | *No description.* | +| terraform_generator_metadata | cdktf.TerraformProviderGeneratorMetadata | *No description.* | +| connection | typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] | *No description.* | +| count | typing.Union[int, float] | *No description.* | +| depends_on | typing.List[str] | *No description.* | +| for_each | cdktf.ITerraformIterator | *No description.* | +| lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | +| provider | cdktf.TerraformProvider | *No description.* | +| provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | +| hmac_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | +| id_input | str | *No description.* | +| name_input | str | *No description.* | +| namespace_input | str | *No description.* | +| hmac | typing.Union[bool, cdktf.IResolvable] | *No description.* | +| id | str | *No description.* | +| name | str | *No description.* | +| namespace | str | *No description.* | + +--- + +##### `node`Required + +```python +node: Node +``` + +- *Type:* constructs.Node + +The tree node. + +--- + +##### `cdktf_stack`Required + +```python +cdktf_stack: TerraformStack +``` + +- *Type:* cdktf.TerraformStack + +--- + +##### `fqn`Required + +```python +fqn: str +``` + +- *Type:* str + +--- + +##### `friendly_unique_id`Required + +```python +friendly_unique_id: str +``` + +- *Type:* str + +--- + +##### `terraform_meta_arguments`Required + +```python +terraform_meta_arguments: typing.Mapping[typing.Any] +``` + +- *Type:* typing.Mapping[typing.Any] + +--- + +##### `terraform_resource_type`Required + +```python +terraform_resource_type: str +``` + +- *Type:* str + +--- + +##### `terraform_generator_metadata`Optional + +```python +terraform_generator_metadata: TerraformProviderGeneratorMetadata +``` + +- *Type:* cdktf.TerraformProviderGeneratorMetadata + +--- + +##### `connection`Optional + +```python +connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection] +``` + +- *Type:* typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] + +--- + +##### `count`Optional + +```python +count: typing.Union[int, float] +``` + +- *Type:* typing.Union[int, float] + +--- + +##### `depends_on`Optional + +```python +depends_on: typing.List[str] +``` + +- *Type:* typing.List[str] + +--- + +##### `for_each`Optional + +```python +for_each: ITerraformIterator +``` + +- *Type:* cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +```python +lifecycle: TerraformResourceLifecycle +``` + +- *Type:* cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +```python +provider: TerraformProvider +``` + +- *Type:* cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +```python +provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]] +``` + +- *Type:* typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] + +--- + +##### `hmac_input`Optional + +```python +hmac_input: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +--- + +##### `id_input`Optional + +```python +id_input: str +``` + +- *Type:* str + +--- + +##### `name_input`Optional + +```python +name_input: str +``` + +- *Type:* str + +--- + +##### `namespace_input`Optional + +```python +namespace_input: str +``` + +- *Type:* str + +--- + +##### `hmac`Required + +```python +hmac: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +--- + +##### `id`Required + +```python +id: str +``` + +- *Type:* str + +--- + +##### `name`Required + +```python +name: str +``` + +- *Type:* str + +--- + +##### `namespace`Required + +```python +namespace: str +``` + +- *Type:* str + +--- + +#### Constants + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| tfResourceType | str | *No description.* | + +--- + +##### `tfResourceType`Required + +```python +tfResourceType: str +``` + +- *Type:* str + +--- + +## Structs + +### AuditRequestHeaderConfig + +#### Initializer + +```python +from cdktf_cdktf_provider_vault import audit_request_header + +auditRequestHeader.AuditRequestHeaderConfig( + connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection] = None, + count: typing.Union[int, float] = None, + depends_on: typing.List[ITerraformDependable] = None, + for_each: ITerraformIterator = None, + lifecycle: TerraformResourceLifecycle = None, + provider: TerraformProvider = None, + provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]] = None, + name: str, + hmac: typing.Union[bool, IResolvable] = None, + id: str = None, + namespace: str = None +) +``` + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| connection | typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] | *No description.* | +| count | typing.Union[int, float] | *No description.* | +| depends_on | typing.List[cdktf.ITerraformDependable] | *No description.* | +| for_each | cdktf.ITerraformIterator | *No description.* | +| lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | +| provider | cdktf.TerraformProvider | *No description.* | +| provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | +| name | str | The name of the request header to audit. | +| hmac | typing.Union[bool, cdktf.IResolvable] | Whether this header's value should be HMAC'd in the audit logs. | +| id | str | Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id}. | +| namespace | str | Target namespace. (requires Enterprise). | + +--- + +##### `connection`Optional + +```python +connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection] +``` + +- *Type:* typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] + +--- + +##### `count`Optional + +```python +count: typing.Union[int, float] +``` + +- *Type:* typing.Union[int, float] + +--- + +##### `depends_on`Optional + +```python +depends_on: typing.List[ITerraformDependable] +``` + +- *Type:* typing.List[cdktf.ITerraformDependable] + +--- + +##### `for_each`Optional + +```python +for_each: ITerraformIterator +``` + +- *Type:* cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +```python +lifecycle: TerraformResourceLifecycle +``` + +- *Type:* cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +```python +provider: TerraformProvider +``` + +- *Type:* cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +```python +provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]] +``` + +- *Type:* typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] + +--- + +##### `name`Required + +```python +name: str +``` + +- *Type:* str + +The name of the request header to audit. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#name AuditRequestHeader#name} + +--- + +##### `hmac`Optional + +```python +hmac: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +Whether this header's value should be HMAC'd in the audit logs. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#hmac AuditRequestHeader#hmac} + +--- + +##### `id`Optional + +```python +id: str +``` + +- *Type:* str + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id}. + +Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. +If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + +--- + +##### `namespace`Optional + +```python +namespace: str +``` + +- *Type:* str + +Target namespace. (requires Enterprise). + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#namespace AuditRequestHeader#namespace} + +--- + + + diff --git a/docs/auditRequestHeader.typescript.md b/docs/auditRequestHeader.typescript.md new file mode 100644 index 000000000..6d84e1d38 --- /dev/null +++ b/docs/auditRequestHeader.typescript.md @@ -0,0 +1,774 @@ +# `auditRequestHeader` Submodule + +## Constructs + +### AuditRequestHeader + +Represents a {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header vault_audit_request_header}. + +#### Initializers + +```typescript +import { auditRequestHeader } from '@cdktf/provider-vault' + +new auditRequestHeader.AuditRequestHeader(scope: Construct, id: string, config: AuditRequestHeaderConfig) +``` + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| scope | constructs.Construct | The scope in which to define this construct. | +| id | string | The scoped construct ID. | +| config | AuditRequestHeaderConfig | *No description.* | + +--- + +##### `scope`Required + +- *Type:* constructs.Construct + +The scope in which to define this construct. + +--- + +##### `id`Required + +- *Type:* string + +The scoped construct ID. + +Must be unique amongst siblings in the same scope + +--- + +##### `config`Required + +- *Type:* AuditRequestHeaderConfig + +--- + +#### Methods + +| **Name** | **Description** | +| --- | --- | +| toString | Returns a string representation of this construct. | +| addOverride | *No description.* | +| overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | +| resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toMetadata | *No description.* | +| toTerraform | Adds this resource to the terraform JSON output. | +| getAnyMapAttribute | *No description.* | +| getBooleanAttribute | *No description.* | +| getBooleanMapAttribute | *No description.* | +| getListAttribute | *No description.* | +| getNumberAttribute | *No description.* | +| getNumberListAttribute | *No description.* | +| getNumberMapAttribute | *No description.* | +| getStringAttribute | *No description.* | +| getStringMapAttribute | *No description.* | +| interpolationForAttribute | *No description.* | +| resetHmac | *No description.* | +| resetId | *No description.* | +| resetNamespace | *No description.* | + +--- + +##### `toString` + +```typescript +public toString(): string +``` + +Returns a string representation of this construct. + +##### `addOverride` + +```typescript +public addOverride(path: string, value: any): void +``` + +###### `path`Required + +- *Type:* string + +--- + +###### `value`Required + +- *Type:* any + +--- + +##### `overrideLogicalId` + +```typescript +public overrideLogicalId(newLogicalId: string): void +``` + +Overrides the auto-generated logical ID with a specific ID. + +###### `newLogicalId`Required + +- *Type:* string + +The new logical ID to use for this stack element. + +--- + +##### `resetOverrideLogicalId` + +```typescript +public resetOverrideLogicalId(): void +``` + +Resets a previously passed logical Id to use the auto-generated logical id again. + +##### `toMetadata` + +```typescript +public toMetadata(): any +``` + +##### `toTerraform` + +```typescript +public toTerraform(): any +``` + +Adds this resource to the terraform JSON output. + +##### `getAnyMapAttribute` + +```typescript +public getAnyMapAttribute(terraformAttribute: string): {[ key: string ]: any} +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getBooleanAttribute` + +```typescript +public getBooleanAttribute(terraformAttribute: string): IResolvable +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getBooleanMapAttribute` + +```typescript +public getBooleanMapAttribute(terraformAttribute: string): {[ key: string ]: boolean} +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getListAttribute` + +```typescript +public getListAttribute(terraformAttribute: string): string[] +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getNumberAttribute` + +```typescript +public getNumberAttribute(terraformAttribute: string): number +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getNumberListAttribute` + +```typescript +public getNumberListAttribute(terraformAttribute: string): number[] +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getNumberMapAttribute` + +```typescript +public getNumberMapAttribute(terraformAttribute: string): {[ key: string ]: number} +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getStringAttribute` + +```typescript +public getStringAttribute(terraformAttribute: string): string +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getStringMapAttribute` + +```typescript +public getStringMapAttribute(terraformAttribute: string): {[ key: string ]: string} +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `interpolationForAttribute` + +```typescript +public interpolationForAttribute(terraformAttribute: string): IResolvable +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `resetHmac` + +```typescript +public resetHmac(): void +``` + +##### `resetId` + +```typescript +public resetId(): void +``` + +##### `resetNamespace` + +```typescript +public resetNamespace(): void +``` + +#### Static Functions + +| **Name** | **Description** | +| --- | --- | +| isConstruct | Checks if `x` is a construct. | +| isTerraformElement | *No description.* | +| isTerraformResource | *No description.* | + +--- + +##### `isConstruct` + +```typescript +import { auditRequestHeader } from '@cdktf/provider-vault' + +auditRequestHeader.AuditRequestHeader.isConstruct(x: any) +``` + +Checks if `x` is a construct. + +Use this method instead of `instanceof` to properly detect `Construct` +instances, even when the construct library is symlinked. + +Explanation: in JavaScript, multiple copies of the `constructs` library on +disk are seen as independent, completely different libraries. As a +consequence, the class `Construct` in each copy of the `constructs` library +is seen as a different class, and an instance of one class will not test as +`instanceof` the other class. `npm install` will not create installations +like this, but users may manually symlink construct libraries together or +use a monorepo tool: in those cases, multiple copies of the `constructs` +library can be accidentally installed, and `instanceof` will behave +unpredictably. It is safest to avoid using `instanceof`, and using +this type-testing method instead. + +###### `x`Required + +- *Type:* any + +Any object. + +--- + +##### `isTerraformElement` + +```typescript +import { auditRequestHeader } from '@cdktf/provider-vault' + +auditRequestHeader.AuditRequestHeader.isTerraformElement(x: any) +``` + +###### `x`Required + +- *Type:* any + +--- + +##### `isTerraformResource` + +```typescript +import { auditRequestHeader } from '@cdktf/provider-vault' + +auditRequestHeader.AuditRequestHeader.isTerraformResource(x: any) +``` + +###### `x`Required + +- *Type:* any + +--- + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| node | constructs.Node | The tree node. | +| cdktfStack | cdktf.TerraformStack | *No description.* | +| fqn | string | *No description.* | +| friendlyUniqueId | string | *No description.* | +| terraformMetaArguments | {[ key: string ]: any} | *No description.* | +| terraformResourceType | string | *No description.* | +| terraformGeneratorMetadata | cdktf.TerraformProviderGeneratorMetadata | *No description.* | +| connection | cdktf.SSHProvisionerConnection \| cdktf.WinrmProvisionerConnection | *No description.* | +| count | number | *No description.* | +| dependsOn | string[] | *No description.* | +| forEach | cdktf.ITerraformIterator | *No description.* | +| lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | +| provider | cdktf.TerraformProvider | *No description.* | +| provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | +| hmacInput | boolean \| cdktf.IResolvable | *No description.* | +| idInput | string | *No description.* | +| nameInput | string | *No description.* | +| namespaceInput | string | *No description.* | +| hmac | boolean \| cdktf.IResolvable | *No description.* | +| id | string | *No description.* | +| name | string | *No description.* | +| namespace | string | *No description.* | + +--- + +##### `node`Required + +```typescript +public readonly node: Node; +``` + +- *Type:* constructs.Node + +The tree node. + +--- + +##### `cdktfStack`Required + +```typescript +public readonly cdktfStack: TerraformStack; +``` + +- *Type:* cdktf.TerraformStack + +--- + +##### `fqn`Required + +```typescript +public readonly fqn: string; +``` + +- *Type:* string + +--- + +##### `friendlyUniqueId`Required + +```typescript +public readonly friendlyUniqueId: string; +``` + +- *Type:* string + +--- + +##### `terraformMetaArguments`Required + +```typescript +public readonly terraformMetaArguments: {[ key: string ]: any}; +``` + +- *Type:* {[ key: string ]: any} + +--- + +##### `terraformResourceType`Required + +```typescript +public readonly terraformResourceType: string; +``` + +- *Type:* string + +--- + +##### `terraformGeneratorMetadata`Optional + +```typescript +public readonly terraformGeneratorMetadata: TerraformProviderGeneratorMetadata; +``` + +- *Type:* cdktf.TerraformProviderGeneratorMetadata + +--- + +##### `connection`Optional + +```typescript +public readonly connection: SSHProvisionerConnection | WinrmProvisionerConnection; +``` + +- *Type:* cdktf.SSHProvisionerConnection | cdktf.WinrmProvisionerConnection + +--- + +##### `count`Optional + +```typescript +public readonly count: number; +``` + +- *Type:* number + +--- + +##### `dependsOn`Optional + +```typescript +public readonly dependsOn: string[]; +``` + +- *Type:* string[] + +--- + +##### `forEach`Optional + +```typescript +public readonly forEach: ITerraformIterator; +``` + +- *Type:* cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +```typescript +public readonly lifecycle: TerraformResourceLifecycle; +``` + +- *Type:* cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +```typescript +public readonly provider: TerraformProvider; +``` + +- *Type:* cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +```typescript +public readonly provisioners: FileProvisioner | LocalExecProvisioner | RemoteExecProvisioner[]; +``` + +- *Type:* cdktf.FileProvisioner | cdktf.LocalExecProvisioner | cdktf.RemoteExecProvisioner[] + +--- + +##### `hmacInput`Optional + +```typescript +public readonly hmacInput: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +--- + +##### `idInput`Optional + +```typescript +public readonly idInput: string; +``` + +- *Type:* string + +--- + +##### `nameInput`Optional + +```typescript +public readonly nameInput: string; +``` + +- *Type:* string + +--- + +##### `namespaceInput`Optional + +```typescript +public readonly namespaceInput: string; +``` + +- *Type:* string + +--- + +##### `hmac`Required + +```typescript +public readonly hmac: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +--- + +##### `id`Required + +```typescript +public readonly id: string; +``` + +- *Type:* string + +--- + +##### `name`Required + +```typescript +public readonly name: string; +``` + +- *Type:* string + +--- + +##### `namespace`Required + +```typescript +public readonly namespace: string; +``` + +- *Type:* string + +--- + +#### Constants + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| tfResourceType | string | *No description.* | + +--- + +##### `tfResourceType`Required + +```typescript +public readonly tfResourceType: string; +``` + +- *Type:* string + +--- + +## Structs + +### AuditRequestHeaderConfig + +#### Initializer + +```typescript +import { auditRequestHeader } from '@cdktf/provider-vault' + +const auditRequestHeaderConfig: auditRequestHeader.AuditRequestHeaderConfig = { ... } +``` + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| connection | cdktf.SSHProvisionerConnection \| cdktf.WinrmProvisionerConnection | *No description.* | +| count | number | *No description.* | +| dependsOn | cdktf.ITerraformDependable[] | *No description.* | +| forEach | cdktf.ITerraformIterator | *No description.* | +| lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | +| provider | cdktf.TerraformProvider | *No description.* | +| provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | +| name | string | The name of the request header to audit. | +| hmac | boolean \| cdktf.IResolvable | Whether this header's value should be HMAC'd in the audit logs. | +| id | string | Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id}. | +| namespace | string | Target namespace. (requires Enterprise). | + +--- + +##### `connection`Optional + +```typescript +public readonly connection: SSHProvisionerConnection | WinrmProvisionerConnection; +``` + +- *Type:* cdktf.SSHProvisionerConnection | cdktf.WinrmProvisionerConnection + +--- + +##### `count`Optional + +```typescript +public readonly count: number; +``` + +- *Type:* number + +--- + +##### `dependsOn`Optional + +```typescript +public readonly dependsOn: ITerraformDependable[]; +``` + +- *Type:* cdktf.ITerraformDependable[] + +--- + +##### `forEach`Optional + +```typescript +public readonly forEach: ITerraformIterator; +``` + +- *Type:* cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +```typescript +public readonly lifecycle: TerraformResourceLifecycle; +``` + +- *Type:* cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +```typescript +public readonly provider: TerraformProvider; +``` + +- *Type:* cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +```typescript +public readonly provisioners: FileProvisioner | LocalExecProvisioner | RemoteExecProvisioner[]; +``` + +- *Type:* cdktf.FileProvisioner | cdktf.LocalExecProvisioner | cdktf.RemoteExecProvisioner[] + +--- + +##### `name`Required + +```typescript +public readonly name: string; +``` + +- *Type:* string + +The name of the request header to audit. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#name AuditRequestHeader#name} + +--- + +##### `hmac`Optional + +```typescript +public readonly hmac: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +Whether this header's value should be HMAC'd in the audit logs. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#hmac AuditRequestHeader#hmac} + +--- + +##### `id`Optional + +```typescript +public readonly id: string; +``` + +- *Type:* string + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id}. + +Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. +If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + +--- + +##### `namespace`Optional + +```typescript +public readonly namespace: string; +``` + +- *Type:* string + +Target namespace. (requires Enterprise). + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#namespace AuditRequestHeader#namespace} + +--- + + + diff --git a/docs/gcpSecretImpersonatedAccount.csharp.md b/docs/gcpSecretImpersonatedAccount.csharp.md new file mode 100644 index 000000000..9ba10eebd --- /dev/null +++ b/docs/gcpSecretImpersonatedAccount.csharp.md @@ -0,0 +1,873 @@ +# `gcpSecretImpersonatedAccount` Submodule + +## Constructs + +### GcpSecretImpersonatedAccount + +Represents a {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}. + +#### Initializers + +```csharp +using HashiCorp.Cdktf.Providers.Vault; + +new GcpSecretImpersonatedAccount(Construct Scope, string Id, GcpSecretImpersonatedAccountConfig Config); +``` + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| Scope | Constructs.Construct | The scope in which to define this construct. | +| Id | string | The scoped construct ID. | +| Config | GcpSecretImpersonatedAccountConfig | *No description.* | + +--- + +##### `Scope`Required + +- *Type:* Constructs.Construct + +The scope in which to define this construct. + +--- + +##### `Id`Required + +- *Type:* string + +The scoped construct ID. + +Must be unique amongst siblings in the same scope + +--- + +##### `Config`Required + +- *Type:* GcpSecretImpersonatedAccountConfig + +--- + +#### Methods + +| **Name** | **Description** | +| --- | --- | +| ToString | Returns a string representation of this construct. | +| AddOverride | *No description.* | +| OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | +| ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToMetadata | *No description.* | +| ToTerraform | Adds this resource to the terraform JSON output. | +| GetAnyMapAttribute | *No description.* | +| GetBooleanAttribute | *No description.* | +| GetBooleanMapAttribute | *No description.* | +| GetListAttribute | *No description.* | +| GetNumberAttribute | *No description.* | +| GetNumberListAttribute | *No description.* | +| GetNumberMapAttribute | *No description.* | +| GetStringAttribute | *No description.* | +| GetStringMapAttribute | *No description.* | +| InterpolationForAttribute | *No description.* | +| ResetId | *No description.* | +| ResetNamespace | *No description.* | +| ResetTokenScopes | *No description.* | + +--- + +##### `ToString` + +```csharp +private string ToString() +``` + +Returns a string representation of this construct. + +##### `AddOverride` + +```csharp +private void AddOverride(string Path, object Value) +``` + +###### `Path`Required + +- *Type:* string + +--- + +###### `Value`Required + +- *Type:* object + +--- + +##### `OverrideLogicalId` + +```csharp +private void OverrideLogicalId(string NewLogicalId) +``` + +Overrides the auto-generated logical ID with a specific ID. + +###### `NewLogicalId`Required + +- *Type:* string + +The new logical ID to use for this stack element. + +--- + +##### `ResetOverrideLogicalId` + +```csharp +private void ResetOverrideLogicalId() +``` + +Resets a previously passed logical Id to use the auto-generated logical id again. + +##### `ToMetadata` + +```csharp +private object ToMetadata() +``` + +##### `ToTerraform` + +```csharp +private object ToTerraform() +``` + +Adds this resource to the terraform JSON output. + +##### `GetAnyMapAttribute` + +```csharp +private System.Collections.Generic.IDictionary GetAnyMapAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetBooleanAttribute` + +```csharp +private IResolvable GetBooleanAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetBooleanMapAttribute` + +```csharp +private System.Collections.Generic.IDictionary GetBooleanMapAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetListAttribute` + +```csharp +private string[] GetListAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetNumberAttribute` + +```csharp +private double GetNumberAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetNumberListAttribute` + +```csharp +private double[] GetNumberListAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetNumberMapAttribute` + +```csharp +private System.Collections.Generic.IDictionary GetNumberMapAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetStringAttribute` + +```csharp +private string GetStringAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetStringMapAttribute` + +```csharp +private System.Collections.Generic.IDictionary GetStringMapAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `InterpolationForAttribute` + +```csharp +private IResolvable InterpolationForAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `ResetId` + +```csharp +private void ResetId() +``` + +##### `ResetNamespace` + +```csharp +private void ResetNamespace() +``` + +##### `ResetTokenScopes` + +```csharp +private void ResetTokenScopes() +``` + +#### Static Functions + +| **Name** | **Description** | +| --- | --- | +| IsConstruct | Checks if `x` is a construct. | +| IsTerraformElement | *No description.* | +| IsTerraformResource | *No description.* | + +--- + +##### `IsConstruct` + +```csharp +using HashiCorp.Cdktf.Providers.Vault; + +GcpSecretImpersonatedAccount.IsConstruct(object X); +``` + +Checks if `x` is a construct. + +Use this method instead of `instanceof` to properly detect `Construct` +instances, even when the construct library is symlinked. + +Explanation: in JavaScript, multiple copies of the `constructs` library on +disk are seen as independent, completely different libraries. As a +consequence, the class `Construct` in each copy of the `constructs` library +is seen as a different class, and an instance of one class will not test as +`instanceof` the other class. `npm install` will not create installations +like this, but users may manually symlink construct libraries together or +use a monorepo tool: in those cases, multiple copies of the `constructs` +library can be accidentally installed, and `instanceof` will behave +unpredictably. It is safest to avoid using `instanceof`, and using +this type-testing method instead. + +###### `X`Required + +- *Type:* object + +Any object. + +--- + +##### `IsTerraformElement` + +```csharp +using HashiCorp.Cdktf.Providers.Vault; + +GcpSecretImpersonatedAccount.IsTerraformElement(object X); +``` + +###### `X`Required + +- *Type:* object + +--- + +##### `IsTerraformResource` + +```csharp +using HashiCorp.Cdktf.Providers.Vault; + +GcpSecretImpersonatedAccount.IsTerraformResource(object X); +``` + +###### `X`Required + +- *Type:* object + +--- + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| Node | Constructs.Node | The tree node. | +| CdktfStack | HashiCorp.Cdktf.TerraformStack | *No description.* | +| Fqn | string | *No description.* | +| FriendlyUniqueId | string | *No description.* | +| TerraformMetaArguments | System.Collections.Generic.IDictionary | *No description.* | +| TerraformResourceType | string | *No description.* | +| TerraformGeneratorMetadata | HashiCorp.Cdktf.TerraformProviderGeneratorMetadata | *No description.* | +| Connection | object | *No description.* | +| Count | double | *No description.* | +| DependsOn | string[] | *No description.* | +| ForEach | HashiCorp.Cdktf.ITerraformIterator | *No description.* | +| Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | +| Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | +| Provisioners | object[] | *No description.* | +| ServiceAccountProject | string | *No description.* | +| BackendInput | string | *No description.* | +| IdInput | string | *No description.* | +| ImpersonatedAccountInput | string | *No description.* | +| NamespaceInput | string | *No description.* | +| ServiceAccountEmailInput | string | *No description.* | +| TokenScopesInput | string[] | *No description.* | +| Backend | string | *No description.* | +| Id | string | *No description.* | +| ImpersonatedAccount | string | *No description.* | +| Namespace | string | *No description.* | +| ServiceAccountEmail | string | *No description.* | +| TokenScopes | string[] | *No description.* | + +--- + +##### `Node`Required + +```csharp +public Node Node { get; } +``` + +- *Type:* Constructs.Node + +The tree node. + +--- + +##### `CdktfStack`Required + +```csharp +public TerraformStack CdktfStack { get; } +``` + +- *Type:* HashiCorp.Cdktf.TerraformStack + +--- + +##### `Fqn`Required + +```csharp +public string Fqn { get; } +``` + +- *Type:* string + +--- + +##### `FriendlyUniqueId`Required + +```csharp +public string FriendlyUniqueId { get; } +``` + +- *Type:* string + +--- + +##### `TerraformMetaArguments`Required + +```csharp +public System.Collections.Generic.IDictionary TerraformMetaArguments { get; } +``` + +- *Type:* System.Collections.Generic.IDictionary + +--- + +##### `TerraformResourceType`Required + +```csharp +public string TerraformResourceType { get; } +``` + +- *Type:* string + +--- + +##### `TerraformGeneratorMetadata`Optional + +```csharp +public TerraformProviderGeneratorMetadata TerraformGeneratorMetadata { get; } +``` + +- *Type:* HashiCorp.Cdktf.TerraformProviderGeneratorMetadata + +--- + +##### `Connection`Optional + +```csharp +public object Connection { get; } +``` + +- *Type:* object + +--- + +##### `Count`Optional + +```csharp +public double Count { get; } +``` + +- *Type:* double + +--- + +##### `DependsOn`Optional + +```csharp +public string[] DependsOn { get; } +``` + +- *Type:* string[] + +--- + +##### `ForEach`Optional + +```csharp +public ITerraformIterator ForEach { get; } +``` + +- *Type:* HashiCorp.Cdktf.ITerraformIterator + +--- + +##### `Lifecycle`Optional + +```csharp +public TerraformResourceLifecycle Lifecycle { get; } +``` + +- *Type:* HashiCorp.Cdktf.TerraformResourceLifecycle + +--- + +##### `Provider`Optional + +```csharp +public TerraformProvider Provider { get; } +``` + +- *Type:* HashiCorp.Cdktf.TerraformProvider + +--- + +##### `Provisioners`Optional + +```csharp +public object[] Provisioners { get; } +``` + +- *Type:* object[] + +--- + +##### `ServiceAccountProject`Required + +```csharp +public string ServiceAccountProject { get; } +``` + +- *Type:* string + +--- + +##### `BackendInput`Optional + +```csharp +public string BackendInput { get; } +``` + +- *Type:* string + +--- + +##### `IdInput`Optional + +```csharp +public string IdInput { get; } +``` + +- *Type:* string + +--- + +##### `ImpersonatedAccountInput`Optional + +```csharp +public string ImpersonatedAccountInput { get; } +``` + +- *Type:* string + +--- + +##### `NamespaceInput`Optional + +```csharp +public string NamespaceInput { get; } +``` + +- *Type:* string + +--- + +##### `ServiceAccountEmailInput`Optional + +```csharp +public string ServiceAccountEmailInput { get; } +``` + +- *Type:* string + +--- + +##### `TokenScopesInput`Optional + +```csharp +public string[] TokenScopesInput { get; } +``` + +- *Type:* string[] + +--- + +##### `Backend`Required + +```csharp +public string Backend { get; } +``` + +- *Type:* string + +--- + +##### `Id`Required + +```csharp +public string Id { get; } +``` + +- *Type:* string + +--- + +##### `ImpersonatedAccount`Required + +```csharp +public string ImpersonatedAccount { get; } +``` + +- *Type:* string + +--- + +##### `Namespace`Required + +```csharp +public string Namespace { get; } +``` + +- *Type:* string + +--- + +##### `ServiceAccountEmail`Required + +```csharp +public string ServiceAccountEmail { get; } +``` + +- *Type:* string + +--- + +##### `TokenScopes`Required + +```csharp +public string[] TokenScopes { get; } +``` + +- *Type:* string[] + +--- + +#### Constants + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| TfResourceType | string | *No description.* | + +--- + +##### `TfResourceType`Required + +```csharp +public string TfResourceType { get; } +``` + +- *Type:* string + +--- + +## Structs + +### GcpSecretImpersonatedAccountConfig + +#### Initializer + +```csharp +using HashiCorp.Cdktf.Providers.Vault; + +new GcpSecretImpersonatedAccountConfig { + object Connection = null, + double Count = null, + ITerraformDependable[] DependsOn = null, + ITerraformIterator ForEach = null, + TerraformResourceLifecycle Lifecycle = null, + TerraformProvider Provider = null, + object[] Provisioners = null, + string Backend, + string ImpersonatedAccount, + string ServiceAccountEmail, + string Id = null, + string Namespace = null, + string[] TokenScopes = null +}; +``` + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| Connection | object | *No description.* | +| Count | double | *No description.* | +| DependsOn | HashiCorp.Cdktf.ITerraformDependable[] | *No description.* | +| ForEach | HashiCorp.Cdktf.ITerraformIterator | *No description.* | +| Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | +| Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | +| Provisioners | object[] | *No description.* | +| Backend | string | Path where the GCP secrets engine is mounted. | +| ImpersonatedAccount | string | Name of the Impersonated Account to create. | +| ServiceAccountEmail | string | Email of the GCP service account. | +| Id | string | Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | +| Namespace | string | Target namespace. (requires Enterprise). | +| TokenScopes | string[] | List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). | + +--- + +##### `Connection`Optional + +```csharp +public object Connection { get; set; } +``` + +- *Type:* object + +--- + +##### `Count`Optional + +```csharp +public double Count { get; set; } +``` + +- *Type:* double + +--- + +##### `DependsOn`Optional + +```csharp +public ITerraformDependable[] DependsOn { get; set; } +``` + +- *Type:* HashiCorp.Cdktf.ITerraformDependable[] + +--- + +##### `ForEach`Optional + +```csharp +public ITerraformIterator ForEach { get; set; } +``` + +- *Type:* HashiCorp.Cdktf.ITerraformIterator + +--- + +##### `Lifecycle`Optional + +```csharp +public TerraformResourceLifecycle Lifecycle { get; set; } +``` + +- *Type:* HashiCorp.Cdktf.TerraformResourceLifecycle + +--- + +##### `Provider`Optional + +```csharp +public TerraformProvider Provider { get; set; } +``` + +- *Type:* HashiCorp.Cdktf.TerraformProvider + +--- + +##### `Provisioners`Optional + +```csharp +public object[] Provisioners { get; set; } +``` + +- *Type:* object[] + +--- + +##### `Backend`Required + +```csharp +public string Backend { get; set; } +``` + +- *Type:* string + +Path where the GCP secrets engine is mounted. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} + +--- + +##### `ImpersonatedAccount`Required + +```csharp +public string ImpersonatedAccount { get; set; } +``` + +- *Type:* string + +Name of the Impersonated Account to create. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} + +--- + +##### `ServiceAccountEmail`Required + +```csharp +public string ServiceAccountEmail { get; set; } +``` + +- *Type:* string + +Email of the GCP service account. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} + +--- + +##### `Id`Optional + +```csharp +public string Id { get; set; } +``` + +- *Type:* string + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. + +Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. +If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + +--- + +##### `Namespace`Optional + +```csharp +public string Namespace { get; set; } +``` + +- *Type:* string + +Target namespace. (requires Enterprise). + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} + +--- + +##### `TokenScopes`Optional + +```csharp +public string[] TokenScopes { get; set; } +``` + +- *Type:* string[] + +List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} + +--- + + + diff --git a/docs/gcpSecretImpersonatedAccount.go.md b/docs/gcpSecretImpersonatedAccount.go.md new file mode 100644 index 000000000..c2edc536f --- /dev/null +++ b/docs/gcpSecretImpersonatedAccount.go.md @@ -0,0 +1,873 @@ +# `gcpSecretImpersonatedAccount` Submodule + +## Constructs + +### GcpSecretImpersonatedAccount + +Represents a {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}. + +#### Initializers + +```go +import "github.com/cdktf/cdktf-provider-vault-go/vault/v5/gcpsecretimpersonatedaccount" + +gcpsecretimpersonatedaccount.NewGcpSecretImpersonatedAccount(scope Construct, id *string, config GcpSecretImpersonatedAccountConfig) GcpSecretImpersonatedAccount +``` + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| scope | github.com/aws/constructs-go/constructs/v10.Construct | The scope in which to define this construct. | +| id | *string | The scoped construct ID. | +| config | GcpSecretImpersonatedAccountConfig | *No description.* | + +--- + +##### `scope`Required + +- *Type:* github.com/aws/constructs-go/constructs/v10.Construct + +The scope in which to define this construct. + +--- + +##### `id`Required + +- *Type:* *string + +The scoped construct ID. + +Must be unique amongst siblings in the same scope + +--- + +##### `config`Required + +- *Type:* GcpSecretImpersonatedAccountConfig + +--- + +#### Methods + +| **Name** | **Description** | +| --- | --- | +| ToString | Returns a string representation of this construct. | +| AddOverride | *No description.* | +| OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | +| ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToMetadata | *No description.* | +| ToTerraform | Adds this resource to the terraform JSON output. | +| GetAnyMapAttribute | *No description.* | +| GetBooleanAttribute | *No description.* | +| GetBooleanMapAttribute | *No description.* | +| GetListAttribute | *No description.* | +| GetNumberAttribute | *No description.* | +| GetNumberListAttribute | *No description.* | +| GetNumberMapAttribute | *No description.* | +| GetStringAttribute | *No description.* | +| GetStringMapAttribute | *No description.* | +| InterpolationForAttribute | *No description.* | +| ResetId | *No description.* | +| ResetNamespace | *No description.* | +| ResetTokenScopes | *No description.* | + +--- + +##### `ToString` + +```go +func ToString() *string +``` + +Returns a string representation of this construct. + +##### `AddOverride` + +```go +func AddOverride(path *string, value interface{}) +``` + +###### `path`Required + +- *Type:* *string + +--- + +###### `value`Required + +- *Type:* interface{} + +--- + +##### `OverrideLogicalId` + +```go +func OverrideLogicalId(newLogicalId *string) +``` + +Overrides the auto-generated logical ID with a specific ID. + +###### `newLogicalId`Required + +- *Type:* *string + +The new logical ID to use for this stack element. + +--- + +##### `ResetOverrideLogicalId` + +```go +func ResetOverrideLogicalId() +``` + +Resets a previously passed logical Id to use the auto-generated logical id again. + +##### `ToMetadata` + +```go +func ToMetadata() interface{} +``` + +##### `ToTerraform` + +```go +func ToTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + +##### `GetAnyMapAttribute` + +```go +func GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetBooleanAttribute` + +```go +func GetBooleanAttribute(terraformAttribute *string) IResolvable +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetBooleanMapAttribute` + +```go +func GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetListAttribute` + +```go +func GetListAttribute(terraformAttribute *string) *[]*string +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetNumberAttribute` + +```go +func GetNumberAttribute(terraformAttribute *string) *f64 +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetNumberListAttribute` + +```go +func GetNumberListAttribute(terraformAttribute *string) *[]*f64 +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetNumberMapAttribute` + +```go +func GetNumberMapAttribute(terraformAttribute *string) *map[string]*f64 +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetStringAttribute` + +```go +func GetStringAttribute(terraformAttribute *string) *string +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetStringMapAttribute` + +```go +func GetStringMapAttribute(terraformAttribute *string) *map[string]*string +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `InterpolationForAttribute` + +```go +func InterpolationForAttribute(terraformAttribute *string) IResolvable +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `ResetId` + +```go +func ResetId() +``` + +##### `ResetNamespace` + +```go +func ResetNamespace() +``` + +##### `ResetTokenScopes` + +```go +func ResetTokenScopes() +``` + +#### Static Functions + +| **Name** | **Description** | +| --- | --- | +| IsConstruct | Checks if `x` is a construct. | +| IsTerraformElement | *No description.* | +| IsTerraformResource | *No description.* | + +--- + +##### `IsConstruct` + +```go +import "github.com/cdktf/cdktf-provider-vault-go/vault/v5/gcpsecretimpersonatedaccount" + +gcpsecretimpersonatedaccount.GcpSecretImpersonatedAccount_IsConstruct(x interface{}) *bool +``` + +Checks if `x` is a construct. + +Use this method instead of `instanceof` to properly detect `Construct` +instances, even when the construct library is symlinked. + +Explanation: in JavaScript, multiple copies of the `constructs` library on +disk are seen as independent, completely different libraries. As a +consequence, the class `Construct` in each copy of the `constructs` library +is seen as a different class, and an instance of one class will not test as +`instanceof` the other class. `npm install` will not create installations +like this, but users may manually symlink construct libraries together or +use a monorepo tool: in those cases, multiple copies of the `constructs` +library can be accidentally installed, and `instanceof` will behave +unpredictably. It is safest to avoid using `instanceof`, and using +this type-testing method instead. + +###### `x`Required + +- *Type:* interface{} + +Any object. + +--- + +##### `IsTerraformElement` + +```go +import "github.com/cdktf/cdktf-provider-vault-go/vault/v5/gcpsecretimpersonatedaccount" + +gcpsecretimpersonatedaccount.GcpSecretImpersonatedAccount_IsTerraformElement(x interface{}) *bool +``` + +###### `x`Required + +- *Type:* interface{} + +--- + +##### `IsTerraformResource` + +```go +import "github.com/cdktf/cdktf-provider-vault-go/vault/v5/gcpsecretimpersonatedaccount" + +gcpsecretimpersonatedaccount.GcpSecretImpersonatedAccount_IsTerraformResource(x interface{}) *bool +``` + +###### `x`Required + +- *Type:* interface{} + +--- + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| Node | github.com/aws/constructs-go/constructs/v10.Node | The tree node. | +| CdktfStack | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformStack | *No description.* | +| Fqn | *string | *No description.* | +| FriendlyUniqueId | *string | *No description.* | +| TerraformMetaArguments | *map[string]interface{} | *No description.* | +| TerraformResourceType | *string | *No description.* | +| TerraformGeneratorMetadata | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProviderGeneratorMetadata | *No description.* | +| Connection | interface{} | *No description.* | +| Count | *f64 | *No description.* | +| DependsOn | *[]*string | *No description.* | +| ForEach | github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator | *No description.* | +| Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | +| Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | +| Provisioners | *[]interface{} | *No description.* | +| ServiceAccountProject | *string | *No description.* | +| BackendInput | *string | *No description.* | +| IdInput | *string | *No description.* | +| ImpersonatedAccountInput | *string | *No description.* | +| NamespaceInput | *string | *No description.* | +| ServiceAccountEmailInput | *string | *No description.* | +| TokenScopesInput | *[]*string | *No description.* | +| Backend | *string | *No description.* | +| Id | *string | *No description.* | +| ImpersonatedAccount | *string | *No description.* | +| Namespace | *string | *No description.* | +| ServiceAccountEmail | *string | *No description.* | +| TokenScopes | *[]*string | *No description.* | + +--- + +##### `Node`Required + +```go +func Node() Node +``` + +- *Type:* github.com/aws/constructs-go/constructs/v10.Node + +The tree node. + +--- + +##### `CdktfStack`Required + +```go +func CdktfStack() TerraformStack +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformStack + +--- + +##### `Fqn`Required + +```go +func Fqn() *string +``` + +- *Type:* *string + +--- + +##### `FriendlyUniqueId`Required + +```go +func FriendlyUniqueId() *string +``` + +- *Type:* *string + +--- + +##### `TerraformMetaArguments`Required + +```go +func TerraformMetaArguments() *map[string]interface{} +``` + +- *Type:* *map[string]interface{} + +--- + +##### `TerraformResourceType`Required + +```go +func TerraformResourceType() *string +``` + +- *Type:* *string + +--- + +##### `TerraformGeneratorMetadata`Optional + +```go +func TerraformGeneratorMetadata() TerraformProviderGeneratorMetadata +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProviderGeneratorMetadata + +--- + +##### `Connection`Optional + +```go +func Connection() interface{} +``` + +- *Type:* interface{} + +--- + +##### `Count`Optional + +```go +func Count() *f64 +``` + +- *Type:* *f64 + +--- + +##### `DependsOn`Optional + +```go +func DependsOn() *[]*string +``` + +- *Type:* *[]*string + +--- + +##### `ForEach`Optional + +```go +func ForEach() ITerraformIterator +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator + +--- + +##### `Lifecycle`Optional + +```go +func Lifecycle() TerraformResourceLifecycle +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle + +--- + +##### `Provider`Optional + +```go +func Provider() TerraformProvider +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider + +--- + +##### `Provisioners`Optional + +```go +func Provisioners() *[]interface{} +``` + +- *Type:* *[]interface{} + +--- + +##### `ServiceAccountProject`Required + +```go +func ServiceAccountProject() *string +``` + +- *Type:* *string + +--- + +##### `BackendInput`Optional + +```go +func BackendInput() *string +``` + +- *Type:* *string + +--- + +##### `IdInput`Optional + +```go +func IdInput() *string +``` + +- *Type:* *string + +--- + +##### `ImpersonatedAccountInput`Optional + +```go +func ImpersonatedAccountInput() *string +``` + +- *Type:* *string + +--- + +##### `NamespaceInput`Optional + +```go +func NamespaceInput() *string +``` + +- *Type:* *string + +--- + +##### `ServiceAccountEmailInput`Optional + +```go +func ServiceAccountEmailInput() *string +``` + +- *Type:* *string + +--- + +##### `TokenScopesInput`Optional + +```go +func TokenScopesInput() *[]*string +``` + +- *Type:* *[]*string + +--- + +##### `Backend`Required + +```go +func Backend() *string +``` + +- *Type:* *string + +--- + +##### `Id`Required + +```go +func Id() *string +``` + +- *Type:* *string + +--- + +##### `ImpersonatedAccount`Required + +```go +func ImpersonatedAccount() *string +``` + +- *Type:* *string + +--- + +##### `Namespace`Required + +```go +func Namespace() *string +``` + +- *Type:* *string + +--- + +##### `ServiceAccountEmail`Required + +```go +func ServiceAccountEmail() *string +``` + +- *Type:* *string + +--- + +##### `TokenScopes`Required + +```go +func TokenScopes() *[]*string +``` + +- *Type:* *[]*string + +--- + +#### Constants + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| TfResourceType | *string | *No description.* | + +--- + +##### `TfResourceType`Required + +```go +func TfResourceType() *string +``` + +- *Type:* *string + +--- + +## Structs + +### GcpSecretImpersonatedAccountConfig + +#### Initializer + +```go +import "github.com/cdktf/cdktf-provider-vault-go/vault/v5/gcpsecretimpersonatedaccount" + +&gcpsecretimpersonatedaccount.GcpSecretImpersonatedAccountConfig { + Connection: interface{}, + Count: *f64, + DependsOn: *[]github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformDependable, + ForEach: github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator, + Lifecycle: github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle, + Provider: github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider, + Provisioners: *[]interface{}, + Backend: *string, + ImpersonatedAccount: *string, + ServiceAccountEmail: *string, + Id: *string, + Namespace: *string, + TokenScopes: *[]*string, +} +``` + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| Connection | interface{} | *No description.* | +| Count | *f64 | *No description.* | +| DependsOn | *[]github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformDependable | *No description.* | +| ForEach | github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator | *No description.* | +| Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | +| Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | +| Provisioners | *[]interface{} | *No description.* | +| Backend | *string | Path where the GCP secrets engine is mounted. | +| ImpersonatedAccount | *string | Name of the Impersonated Account to create. | +| ServiceAccountEmail | *string | Email of the GCP service account. | +| Id | *string | Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | +| Namespace | *string | Target namespace. (requires Enterprise). | +| TokenScopes | *[]*string | List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). | + +--- + +##### `Connection`Optional + +```go +Connection interface{} +``` + +- *Type:* interface{} + +--- + +##### `Count`Optional + +```go +Count *f64 +``` + +- *Type:* *f64 + +--- + +##### `DependsOn`Optional + +```go +DependsOn *[]ITerraformDependable +``` + +- *Type:* *[]github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformDependable + +--- + +##### `ForEach`Optional + +```go +ForEach ITerraformIterator +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator + +--- + +##### `Lifecycle`Optional + +```go +Lifecycle TerraformResourceLifecycle +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle + +--- + +##### `Provider`Optional + +```go +Provider TerraformProvider +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider + +--- + +##### `Provisioners`Optional + +```go +Provisioners *[]interface{} +``` + +- *Type:* *[]interface{} + +--- + +##### `Backend`Required + +```go +Backend *string +``` + +- *Type:* *string + +Path where the GCP secrets engine is mounted. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} + +--- + +##### `ImpersonatedAccount`Required + +```go +ImpersonatedAccount *string +``` + +- *Type:* *string + +Name of the Impersonated Account to create. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} + +--- + +##### `ServiceAccountEmail`Required + +```go +ServiceAccountEmail *string +``` + +- *Type:* *string + +Email of the GCP service account. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} + +--- + +##### `Id`Optional + +```go +Id *string +``` + +- *Type:* *string + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. + +Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. +If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + +--- + +##### `Namespace`Optional + +```go +Namespace *string +``` + +- *Type:* *string + +Target namespace. (requires Enterprise). + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} + +--- + +##### `TokenScopes`Optional + +```go +TokenScopes *[]*string +``` + +- *Type:* *[]*string + +List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} + +--- + + + diff --git a/docs/gcpSecretImpersonatedAccount.java.md b/docs/gcpSecretImpersonatedAccount.java.md new file mode 100644 index 000000000..9280fffa1 --- /dev/null +++ b/docs/gcpSecretImpersonatedAccount.java.md @@ -0,0 +1,1002 @@ +# `gcpSecretImpersonatedAccount` Submodule + +## Constructs + +### GcpSecretImpersonatedAccount + +Represents a {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}. + +#### Initializers + +```java +import com.hashicorp.cdktf.providers.vault.gcp_secret_impersonated_account.GcpSecretImpersonatedAccount; + +GcpSecretImpersonatedAccount.Builder.create(Construct scope, java.lang.String id) +// .connection(SSHProvisionerConnection) +// .connection(WinrmProvisionerConnection) +// .count(java.lang.Number) +// .dependsOn(java.util.List) +// .forEach(ITerraformIterator) +// .lifecycle(TerraformResourceLifecycle) +// .provider(TerraformProvider) +// .provisioners(java.util.List) + .backend(java.lang.String) + .impersonatedAccount(java.lang.String) + .serviceAccountEmail(java.lang.String) +// .id(java.lang.String) +// .namespace(java.lang.String) +// .tokenScopes(java.util.List) + .build(); +``` + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| scope | software.constructs.Construct | The scope in which to define this construct. | +| id | java.lang.String | The scoped construct ID. | +| connection | com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection | *No description.* | +| count | java.lang.Number | *No description.* | +| dependsOn | java.util.List | *No description.* | +| forEach | com.hashicorp.cdktf.ITerraformIterator | *No description.* | +| lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | +| provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | +| provisioners | java.util.List | *No description.* | +| backend | java.lang.String | Path where the GCP secrets engine is mounted. | +| impersonatedAccount | java.lang.String | Name of the Impersonated Account to create. | +| serviceAccountEmail | java.lang.String | Email of the GCP service account. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | +| namespace | java.lang.String | Target namespace. (requires Enterprise). | +| tokenScopes | java.util.List | List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). | + +--- + +##### `scope`Required + +- *Type:* software.constructs.Construct + +The scope in which to define this construct. + +--- + +##### `id`Required + +- *Type:* java.lang.String + +The scoped construct ID. + +Must be unique amongst siblings in the same scope + +--- + +##### `connection`Optional + +- *Type:* com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection + +--- + +##### `count`Optional + +- *Type:* java.lang.Number + +--- + +##### `dependsOn`Optional + +- *Type:* java.util.List + +--- + +##### `forEach`Optional + +- *Type:* com.hashicorp.cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +- *Type:* com.hashicorp.cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +- *Type:* com.hashicorp.cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +- *Type:* java.util.List + +--- + +##### `backend`Required + +- *Type:* java.lang.String + +Path where the GCP secrets engine is mounted. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} + +--- + +##### `impersonatedAccount`Required + +- *Type:* java.lang.String + +Name of the Impersonated Account to create. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} + +--- + +##### `serviceAccountEmail`Required + +- *Type:* java.lang.String + +Email of the GCP service account. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} + +--- + +##### `id`Optional + +- *Type:* java.lang.String + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. + +Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. +If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + +--- + +##### `namespace`Optional + +- *Type:* java.lang.String + +Target namespace. (requires Enterprise). + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} + +--- + +##### `tokenScopes`Optional + +- *Type:* java.util.List + +List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} + +--- + +#### Methods + +| **Name** | **Description** | +| --- | --- | +| toString | Returns a string representation of this construct. | +| addOverride | *No description.* | +| overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | +| resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toMetadata | *No description.* | +| toTerraform | Adds this resource to the terraform JSON output. | +| getAnyMapAttribute | *No description.* | +| getBooleanAttribute | *No description.* | +| getBooleanMapAttribute | *No description.* | +| getListAttribute | *No description.* | +| getNumberAttribute | *No description.* | +| getNumberListAttribute | *No description.* | +| getNumberMapAttribute | *No description.* | +| getStringAttribute | *No description.* | +| getStringMapAttribute | *No description.* | +| interpolationForAttribute | *No description.* | +| resetId | *No description.* | +| resetNamespace | *No description.* | +| resetTokenScopes | *No description.* | + +--- + +##### `toString` + +```java +public java.lang.String toString() +``` + +Returns a string representation of this construct. + +##### `addOverride` + +```java +public void addOverride(java.lang.String path, java.lang.Object value) +``` + +###### `path`Required + +- *Type:* java.lang.String + +--- + +###### `value`Required + +- *Type:* java.lang.Object + +--- + +##### `overrideLogicalId` + +```java +public void overrideLogicalId(java.lang.String newLogicalId) +``` + +Overrides the auto-generated logical ID with a specific ID. + +###### `newLogicalId`Required + +- *Type:* java.lang.String + +The new logical ID to use for this stack element. + +--- + +##### `resetOverrideLogicalId` + +```java +public void resetOverrideLogicalId() +``` + +Resets a previously passed logical Id to use the auto-generated logical id again. + +##### `toMetadata` + +```java +public java.lang.Object toMetadata() +``` + +##### `toTerraform` + +```java +public java.lang.Object toTerraform() +``` + +Adds this resource to the terraform JSON output. + +##### `getAnyMapAttribute` + +```java +public java.util.Map getAnyMapAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getBooleanAttribute` + +```java +public IResolvable getBooleanAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getBooleanMapAttribute` + +```java +public java.util.Map getBooleanMapAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getListAttribute` + +```java +public java.util.List getListAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getNumberAttribute` + +```java +public java.lang.Number getNumberAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getNumberListAttribute` + +```java +public java.util.List getNumberListAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getNumberMapAttribute` + +```java +public java.util.Map getNumberMapAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getStringAttribute` + +```java +public java.lang.String getStringAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getStringMapAttribute` + +```java +public java.util.Map getStringMapAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `interpolationForAttribute` + +```java +public IResolvable interpolationForAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `resetId` + +```java +public void resetId() +``` + +##### `resetNamespace` + +```java +public void resetNamespace() +``` + +##### `resetTokenScopes` + +```java +public void resetTokenScopes() +``` + +#### Static Functions + +| **Name** | **Description** | +| --- | --- | +| isConstruct | Checks if `x` is a construct. | +| isTerraformElement | *No description.* | +| isTerraformResource | *No description.* | + +--- + +##### `isConstruct` + +```java +import com.hashicorp.cdktf.providers.vault.gcp_secret_impersonated_account.GcpSecretImpersonatedAccount; + +GcpSecretImpersonatedAccount.isConstruct(java.lang.Object x) +``` + +Checks if `x` is a construct. + +Use this method instead of `instanceof` to properly detect `Construct` +instances, even when the construct library is symlinked. + +Explanation: in JavaScript, multiple copies of the `constructs` library on +disk are seen as independent, completely different libraries. As a +consequence, the class `Construct` in each copy of the `constructs` library +is seen as a different class, and an instance of one class will not test as +`instanceof` the other class. `npm install` will not create installations +like this, but users may manually symlink construct libraries together or +use a monorepo tool: in those cases, multiple copies of the `constructs` +library can be accidentally installed, and `instanceof` will behave +unpredictably. It is safest to avoid using `instanceof`, and using +this type-testing method instead. + +###### `x`Required + +- *Type:* java.lang.Object + +Any object. + +--- + +##### `isTerraformElement` + +```java +import com.hashicorp.cdktf.providers.vault.gcp_secret_impersonated_account.GcpSecretImpersonatedAccount; + +GcpSecretImpersonatedAccount.isTerraformElement(java.lang.Object x) +``` + +###### `x`Required + +- *Type:* java.lang.Object + +--- + +##### `isTerraformResource` + +```java +import com.hashicorp.cdktf.providers.vault.gcp_secret_impersonated_account.GcpSecretImpersonatedAccount; + +GcpSecretImpersonatedAccount.isTerraformResource(java.lang.Object x) +``` + +###### `x`Required + +- *Type:* java.lang.Object + +--- + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| node | software.constructs.Node | The tree node. | +| cdktfStack | com.hashicorp.cdktf.TerraformStack | *No description.* | +| fqn | java.lang.String | *No description.* | +| friendlyUniqueId | java.lang.String | *No description.* | +| terraformMetaArguments | java.util.Map | *No description.* | +| terraformResourceType | java.lang.String | *No description.* | +| terraformGeneratorMetadata | com.hashicorp.cdktf.TerraformProviderGeneratorMetadata | *No description.* | +| connection | com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection | *No description.* | +| count | java.lang.Number | *No description.* | +| dependsOn | java.util.List | *No description.* | +| forEach | com.hashicorp.cdktf.ITerraformIterator | *No description.* | +| lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | +| provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | +| provisioners | java.util.List | *No description.* | +| serviceAccountProject | java.lang.String | *No description.* | +| backendInput | java.lang.String | *No description.* | +| idInput | java.lang.String | *No description.* | +| impersonatedAccountInput | java.lang.String | *No description.* | +| namespaceInput | java.lang.String | *No description.* | +| serviceAccountEmailInput | java.lang.String | *No description.* | +| tokenScopesInput | java.util.List | *No description.* | +| backend | java.lang.String | *No description.* | +| id | java.lang.String | *No description.* | +| impersonatedAccount | java.lang.String | *No description.* | +| namespace | java.lang.String | *No description.* | +| serviceAccountEmail | java.lang.String | *No description.* | +| tokenScopes | java.util.List | *No description.* | + +--- + +##### `node`Required + +```java +public Node getNode(); +``` + +- *Type:* software.constructs.Node + +The tree node. + +--- + +##### `cdktfStack`Required + +```java +public TerraformStack getCdktfStack(); +``` + +- *Type:* com.hashicorp.cdktf.TerraformStack + +--- + +##### `fqn`Required + +```java +public java.lang.String getFqn(); +``` + +- *Type:* java.lang.String + +--- + +##### `friendlyUniqueId`Required + +```java +public java.lang.String getFriendlyUniqueId(); +``` + +- *Type:* java.lang.String + +--- + +##### `terraformMetaArguments`Required + +```java +public java.util.Map getTerraformMetaArguments(); +``` + +- *Type:* java.util.Map + +--- + +##### `terraformResourceType`Required + +```java +public java.lang.String getTerraformResourceType(); +``` + +- *Type:* java.lang.String + +--- + +##### `terraformGeneratorMetadata`Optional + +```java +public TerraformProviderGeneratorMetadata getTerraformGeneratorMetadata(); +``` + +- *Type:* com.hashicorp.cdktf.TerraformProviderGeneratorMetadata + +--- + +##### `connection`Optional + +```java +public java.lang.Object getConnection(); +``` + +- *Type:* com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection + +--- + +##### `count`Optional + +```java +public java.lang.Number getCount(); +``` + +- *Type:* java.lang.Number + +--- + +##### `dependsOn`Optional + +```java +public java.util.List getDependsOn(); +``` + +- *Type:* java.util.List + +--- + +##### `forEach`Optional + +```java +public ITerraformIterator getForEach(); +``` + +- *Type:* com.hashicorp.cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +```java +public TerraformResourceLifecycle getLifecycle(); +``` + +- *Type:* com.hashicorp.cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +```java +public TerraformProvider getProvider(); +``` + +- *Type:* com.hashicorp.cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +```java +public java.lang.Object getProvisioners(); +``` + +- *Type:* java.util.List + +--- + +##### `serviceAccountProject`Required + +```java +public java.lang.String getServiceAccountProject(); +``` + +- *Type:* java.lang.String + +--- + +##### `backendInput`Optional + +```java +public java.lang.String getBackendInput(); +``` + +- *Type:* java.lang.String + +--- + +##### `idInput`Optional + +```java +public java.lang.String getIdInput(); +``` + +- *Type:* java.lang.String + +--- + +##### `impersonatedAccountInput`Optional + +```java +public java.lang.String getImpersonatedAccountInput(); +``` + +- *Type:* java.lang.String + +--- + +##### `namespaceInput`Optional + +```java +public java.lang.String getNamespaceInput(); +``` + +- *Type:* java.lang.String + +--- + +##### `serviceAccountEmailInput`Optional + +```java +public java.lang.String getServiceAccountEmailInput(); +``` + +- *Type:* java.lang.String + +--- + +##### `tokenScopesInput`Optional + +```java +public java.util.List getTokenScopesInput(); +``` + +- *Type:* java.util.List + +--- + +##### `backend`Required + +```java +public java.lang.String getBackend(); +``` + +- *Type:* java.lang.String + +--- + +##### `id`Required + +```java +public java.lang.String getId(); +``` + +- *Type:* java.lang.String + +--- + +##### `impersonatedAccount`Required + +```java +public java.lang.String getImpersonatedAccount(); +``` + +- *Type:* java.lang.String + +--- + +##### `namespace`Required + +```java +public java.lang.String getNamespace(); +``` + +- *Type:* java.lang.String + +--- + +##### `serviceAccountEmail`Required + +```java +public java.lang.String getServiceAccountEmail(); +``` + +- *Type:* java.lang.String + +--- + +##### `tokenScopes`Required + +```java +public java.util.List getTokenScopes(); +``` + +- *Type:* java.util.List + +--- + +#### Constants + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| tfResourceType | java.lang.String | *No description.* | + +--- + +##### `tfResourceType`Required + +```java +public java.lang.String getTfResourceType(); +``` + +- *Type:* java.lang.String + +--- + +## Structs + +### GcpSecretImpersonatedAccountConfig + +#### Initializer + +```java +import com.hashicorp.cdktf.providers.vault.gcp_secret_impersonated_account.GcpSecretImpersonatedAccountConfig; + +GcpSecretImpersonatedAccountConfig.builder() +// .connection(SSHProvisionerConnection) +// .connection(WinrmProvisionerConnection) +// .count(java.lang.Number) +// .dependsOn(java.util.List) +// .forEach(ITerraformIterator) +// .lifecycle(TerraformResourceLifecycle) +// .provider(TerraformProvider) +// .provisioners(java.util.List) + .backend(java.lang.String) + .impersonatedAccount(java.lang.String) + .serviceAccountEmail(java.lang.String) +// .id(java.lang.String) +// .namespace(java.lang.String) +// .tokenScopes(java.util.List) + .build(); +``` + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| connection | com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection | *No description.* | +| count | java.lang.Number | *No description.* | +| dependsOn | java.util.List | *No description.* | +| forEach | com.hashicorp.cdktf.ITerraformIterator | *No description.* | +| lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | +| provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | +| provisioners | java.util.List | *No description.* | +| backend | java.lang.String | Path where the GCP secrets engine is mounted. | +| impersonatedAccount | java.lang.String | Name of the Impersonated Account to create. | +| serviceAccountEmail | java.lang.String | Email of the GCP service account. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | +| namespace | java.lang.String | Target namespace. (requires Enterprise). | +| tokenScopes | java.util.List | List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). | + +--- + +##### `connection`Optional + +```java +public java.lang.Object getConnection(); +``` + +- *Type:* com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection + +--- + +##### `count`Optional + +```java +public java.lang.Number getCount(); +``` + +- *Type:* java.lang.Number + +--- + +##### `dependsOn`Optional + +```java +public java.util.List getDependsOn(); +``` + +- *Type:* java.util.List + +--- + +##### `forEach`Optional + +```java +public ITerraformIterator getForEach(); +``` + +- *Type:* com.hashicorp.cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +```java +public TerraformResourceLifecycle getLifecycle(); +``` + +- *Type:* com.hashicorp.cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +```java +public TerraformProvider getProvider(); +``` + +- *Type:* com.hashicorp.cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +```java +public java.lang.Object getProvisioners(); +``` + +- *Type:* java.util.List + +--- + +##### `backend`Required + +```java +public java.lang.String getBackend(); +``` + +- *Type:* java.lang.String + +Path where the GCP secrets engine is mounted. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} + +--- + +##### `impersonatedAccount`Required + +```java +public java.lang.String getImpersonatedAccount(); +``` + +- *Type:* java.lang.String + +Name of the Impersonated Account to create. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} + +--- + +##### `serviceAccountEmail`Required + +```java +public java.lang.String getServiceAccountEmail(); +``` + +- *Type:* java.lang.String + +Email of the GCP service account. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} + +--- + +##### `id`Optional + +```java +public java.lang.String getId(); +``` + +- *Type:* java.lang.String + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. + +Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. +If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + +--- + +##### `namespace`Optional + +```java +public java.lang.String getNamespace(); +``` + +- *Type:* java.lang.String + +Target namespace. (requires Enterprise). + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} + +--- + +##### `tokenScopes`Optional + +```java +public java.util.List getTokenScopes(); +``` + +- *Type:* java.util.List + +List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} + +--- + + + diff --git a/docs/gcpSecretImpersonatedAccount.python.md b/docs/gcpSecretImpersonatedAccount.python.md new file mode 100644 index 000000000..ce539197c --- /dev/null +++ b/docs/gcpSecretImpersonatedAccount.python.md @@ -0,0 +1,1029 @@ +# `gcpSecretImpersonatedAccount` Submodule + +## Constructs + +### GcpSecretImpersonatedAccount + +Represents a {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}. + +#### Initializers + +```python +from cdktf_cdktf_provider_vault import gcp_secret_impersonated_account + +gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccount( + scope: Construct, + id: str, + connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection] = None, + count: typing.Union[int, float] = None, + depends_on: typing.List[ITerraformDependable] = None, + for_each: ITerraformIterator = None, + lifecycle: TerraformResourceLifecycle = None, + provider: TerraformProvider = None, + provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]] = None, + backend: str, + impersonated_account: str, + service_account_email: str, + id: str = None, + namespace: str = None, + token_scopes: typing.List[str] = None +) +``` + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| scope | constructs.Construct | The scope in which to define this construct. | +| id | str | The scoped construct ID. | +| connection | typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] | *No description.* | +| count | typing.Union[int, float] | *No description.* | +| depends_on | typing.List[cdktf.ITerraformDependable] | *No description.* | +| for_each | cdktf.ITerraformIterator | *No description.* | +| lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | +| provider | cdktf.TerraformProvider | *No description.* | +| provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | +| backend | str | Path where the GCP secrets engine is mounted. | +| impersonated_account | str | Name of the Impersonated Account to create. | +| service_account_email | str | Email of the GCP service account. | +| id | str | Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | +| namespace | str | Target namespace. (requires Enterprise). | +| token_scopes | typing.List[str] | List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). | + +--- + +##### `scope`Required + +- *Type:* constructs.Construct + +The scope in which to define this construct. + +--- + +##### `id`Required + +- *Type:* str + +The scoped construct ID. + +Must be unique amongst siblings in the same scope + +--- + +##### `connection`Optional + +- *Type:* typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] + +--- + +##### `count`Optional + +- *Type:* typing.Union[int, float] + +--- + +##### `depends_on`Optional + +- *Type:* typing.List[cdktf.ITerraformDependable] + +--- + +##### `for_each`Optional + +- *Type:* cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +- *Type:* cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +- *Type:* cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +- *Type:* typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] + +--- + +##### `backend`Required + +- *Type:* str + +Path where the GCP secrets engine is mounted. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} + +--- + +##### `impersonated_account`Required + +- *Type:* str + +Name of the Impersonated Account to create. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} + +--- + +##### `service_account_email`Required + +- *Type:* str + +Email of the GCP service account. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} + +--- + +##### `id`Optional + +- *Type:* str + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. + +Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. +If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + +--- + +##### `namespace`Optional + +- *Type:* str + +Target namespace. (requires Enterprise). + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} + +--- + +##### `token_scopes`Optional + +- *Type:* typing.List[str] + +List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} + +--- + +#### Methods + +| **Name** | **Description** | +| --- | --- | +| to_string | Returns a string representation of this construct. | +| add_override | *No description.* | +| override_logical_id | Overrides the auto-generated logical ID with a specific ID. | +| reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_metadata | *No description.* | +| to_terraform | Adds this resource to the terraform JSON output. | +| get_any_map_attribute | *No description.* | +| get_boolean_attribute | *No description.* | +| get_boolean_map_attribute | *No description.* | +| get_list_attribute | *No description.* | +| get_number_attribute | *No description.* | +| get_number_list_attribute | *No description.* | +| get_number_map_attribute | *No description.* | +| get_string_attribute | *No description.* | +| get_string_map_attribute | *No description.* | +| interpolation_for_attribute | *No description.* | +| reset_id | *No description.* | +| reset_namespace | *No description.* | +| reset_token_scopes | *No description.* | + +--- + +##### `to_string` + +```python +def to_string() -> str +``` + +Returns a string representation of this construct. + +##### `add_override` + +```python +def add_override( + path: str, + value: typing.Any +) -> None +``` + +###### `path`Required + +- *Type:* str + +--- + +###### `value`Required + +- *Type:* typing.Any + +--- + +##### `override_logical_id` + +```python +def override_logical_id( + new_logical_id: str +) -> None +``` + +Overrides the auto-generated logical ID with a specific ID. + +###### `new_logical_id`Required + +- *Type:* str + +The new logical ID to use for this stack element. + +--- + +##### `reset_override_logical_id` + +```python +def reset_override_logical_id() -> None +``` + +Resets a previously passed logical Id to use the auto-generated logical id again. + +##### `to_metadata` + +```python +def to_metadata() -> typing.Any +``` + +##### `to_terraform` + +```python +def to_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + +##### `get_any_map_attribute` + +```python +def get_any_map_attribute( + terraform_attribute: str +) -> typing.Mapping[typing.Any] +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_boolean_attribute` + +```python +def get_boolean_attribute( + terraform_attribute: str +) -> IResolvable +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_boolean_map_attribute` + +```python +def get_boolean_map_attribute( + terraform_attribute: str +) -> typing.Mapping[bool] +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_list_attribute` + +```python +def get_list_attribute( + terraform_attribute: str +) -> typing.List[str] +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_number_attribute` + +```python +def get_number_attribute( + terraform_attribute: str +) -> typing.Union[int, float] +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_number_list_attribute` + +```python +def get_number_list_attribute( + terraform_attribute: str +) -> typing.List[typing.Union[int, float]] +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_number_map_attribute` + +```python +def get_number_map_attribute( + terraform_attribute: str +) -> typing.Mapping[typing.Union[int, float]] +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_string_attribute` + +```python +def get_string_attribute( + terraform_attribute: str +) -> str +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_string_map_attribute` + +```python +def get_string_map_attribute( + terraform_attribute: str +) -> typing.Mapping[str] +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `interpolation_for_attribute` + +```python +def interpolation_for_attribute( + terraform_attribute: str +) -> IResolvable +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `reset_id` + +```python +def reset_id() -> None +``` + +##### `reset_namespace` + +```python +def reset_namespace() -> None +``` + +##### `reset_token_scopes` + +```python +def reset_token_scopes() -> None +``` + +#### Static Functions + +| **Name** | **Description** | +| --- | --- | +| is_construct | Checks if `x` is a construct. | +| is_terraform_element | *No description.* | +| is_terraform_resource | *No description.* | + +--- + +##### `is_construct` + +```python +from cdktf_cdktf_provider_vault import gcp_secret_impersonated_account + +gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccount.is_construct( + x: typing.Any +) +``` + +Checks if `x` is a construct. + +Use this method instead of `instanceof` to properly detect `Construct` +instances, even when the construct library is symlinked. + +Explanation: in JavaScript, multiple copies of the `constructs` library on +disk are seen as independent, completely different libraries. As a +consequence, the class `Construct` in each copy of the `constructs` library +is seen as a different class, and an instance of one class will not test as +`instanceof` the other class. `npm install` will not create installations +like this, but users may manually symlink construct libraries together or +use a monorepo tool: in those cases, multiple copies of the `constructs` +library can be accidentally installed, and `instanceof` will behave +unpredictably. It is safest to avoid using `instanceof`, and using +this type-testing method instead. + +###### `x`Required + +- *Type:* typing.Any + +Any object. + +--- + +##### `is_terraform_element` + +```python +from cdktf_cdktf_provider_vault import gcp_secret_impersonated_account + +gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccount.is_terraform_element( + x: typing.Any +) +``` + +###### `x`Required + +- *Type:* typing.Any + +--- + +##### `is_terraform_resource` + +```python +from cdktf_cdktf_provider_vault import gcp_secret_impersonated_account + +gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccount.is_terraform_resource( + x: typing.Any +) +``` + +###### `x`Required + +- *Type:* typing.Any + +--- + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| node | constructs.Node | The tree node. | +| cdktf_stack | cdktf.TerraformStack | *No description.* | +| fqn | str | *No description.* | +| friendly_unique_id | str | *No description.* | +| terraform_meta_arguments | typing.Mapping[typing.Any] | *No description.* | +| terraform_resource_type | str | *No description.* | +| terraform_generator_metadata | cdktf.TerraformProviderGeneratorMetadata | *No description.* | +| connection | typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] | *No description.* | +| count | typing.Union[int, float] | *No description.* | +| depends_on | typing.List[str] | *No description.* | +| for_each | cdktf.ITerraformIterator | *No description.* | +| lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | +| provider | cdktf.TerraformProvider | *No description.* | +| provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | +| service_account_project | str | *No description.* | +| backend_input | str | *No description.* | +| id_input | str | *No description.* | +| impersonated_account_input | str | *No description.* | +| namespace_input | str | *No description.* | +| service_account_email_input | str | *No description.* | +| token_scopes_input | typing.List[str] | *No description.* | +| backend | str | *No description.* | +| id | str | *No description.* | +| impersonated_account | str | *No description.* | +| namespace | str | *No description.* | +| service_account_email | str | *No description.* | +| token_scopes | typing.List[str] | *No description.* | + +--- + +##### `node`Required + +```python +node: Node +``` + +- *Type:* constructs.Node + +The tree node. + +--- + +##### `cdktf_stack`Required + +```python +cdktf_stack: TerraformStack +``` + +- *Type:* cdktf.TerraformStack + +--- + +##### `fqn`Required + +```python +fqn: str +``` + +- *Type:* str + +--- + +##### `friendly_unique_id`Required + +```python +friendly_unique_id: str +``` + +- *Type:* str + +--- + +##### `terraform_meta_arguments`Required + +```python +terraform_meta_arguments: typing.Mapping[typing.Any] +``` + +- *Type:* typing.Mapping[typing.Any] + +--- + +##### `terraform_resource_type`Required + +```python +terraform_resource_type: str +``` + +- *Type:* str + +--- + +##### `terraform_generator_metadata`Optional + +```python +terraform_generator_metadata: TerraformProviderGeneratorMetadata +``` + +- *Type:* cdktf.TerraformProviderGeneratorMetadata + +--- + +##### `connection`Optional + +```python +connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection] +``` + +- *Type:* typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] + +--- + +##### `count`Optional + +```python +count: typing.Union[int, float] +``` + +- *Type:* typing.Union[int, float] + +--- + +##### `depends_on`Optional + +```python +depends_on: typing.List[str] +``` + +- *Type:* typing.List[str] + +--- + +##### `for_each`Optional + +```python +for_each: ITerraformIterator +``` + +- *Type:* cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +```python +lifecycle: TerraformResourceLifecycle +``` + +- *Type:* cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +```python +provider: TerraformProvider +``` + +- *Type:* cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +```python +provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]] +``` + +- *Type:* typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] + +--- + +##### `service_account_project`Required + +```python +service_account_project: str +``` + +- *Type:* str + +--- + +##### `backend_input`Optional + +```python +backend_input: str +``` + +- *Type:* str + +--- + +##### `id_input`Optional + +```python +id_input: str +``` + +- *Type:* str + +--- + +##### `impersonated_account_input`Optional + +```python +impersonated_account_input: str +``` + +- *Type:* str + +--- + +##### `namespace_input`Optional + +```python +namespace_input: str +``` + +- *Type:* str + +--- + +##### `service_account_email_input`Optional + +```python +service_account_email_input: str +``` + +- *Type:* str + +--- + +##### `token_scopes_input`Optional + +```python +token_scopes_input: typing.List[str] +``` + +- *Type:* typing.List[str] + +--- + +##### `backend`Required + +```python +backend: str +``` + +- *Type:* str + +--- + +##### `id`Required + +```python +id: str +``` + +- *Type:* str + +--- + +##### `impersonated_account`Required + +```python +impersonated_account: str +``` + +- *Type:* str + +--- + +##### `namespace`Required + +```python +namespace: str +``` + +- *Type:* str + +--- + +##### `service_account_email`Required + +```python +service_account_email: str +``` + +- *Type:* str + +--- + +##### `token_scopes`Required + +```python +token_scopes: typing.List[str] +``` + +- *Type:* typing.List[str] + +--- + +#### Constants + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| tfResourceType | str | *No description.* | + +--- + +##### `tfResourceType`Required + +```python +tfResourceType: str +``` + +- *Type:* str + +--- + +## Structs + +### GcpSecretImpersonatedAccountConfig + +#### Initializer + +```python +from cdktf_cdktf_provider_vault import gcp_secret_impersonated_account + +gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccountConfig( + connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection] = None, + count: typing.Union[int, float] = None, + depends_on: typing.List[ITerraformDependable] = None, + for_each: ITerraformIterator = None, + lifecycle: TerraformResourceLifecycle = None, + provider: TerraformProvider = None, + provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]] = None, + backend: str, + impersonated_account: str, + service_account_email: str, + id: str = None, + namespace: str = None, + token_scopes: typing.List[str] = None +) +``` + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| connection | typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] | *No description.* | +| count | typing.Union[int, float] | *No description.* | +| depends_on | typing.List[cdktf.ITerraformDependable] | *No description.* | +| for_each | cdktf.ITerraformIterator | *No description.* | +| lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | +| provider | cdktf.TerraformProvider | *No description.* | +| provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | +| backend | str | Path where the GCP secrets engine is mounted. | +| impersonated_account | str | Name of the Impersonated Account to create. | +| service_account_email | str | Email of the GCP service account. | +| id | str | Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | +| namespace | str | Target namespace. (requires Enterprise). | +| token_scopes | typing.List[str] | List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). | + +--- + +##### `connection`Optional + +```python +connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection] +``` + +- *Type:* typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] + +--- + +##### `count`Optional + +```python +count: typing.Union[int, float] +``` + +- *Type:* typing.Union[int, float] + +--- + +##### `depends_on`Optional + +```python +depends_on: typing.List[ITerraformDependable] +``` + +- *Type:* typing.List[cdktf.ITerraformDependable] + +--- + +##### `for_each`Optional + +```python +for_each: ITerraformIterator +``` + +- *Type:* cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +```python +lifecycle: TerraformResourceLifecycle +``` + +- *Type:* cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +```python +provider: TerraformProvider +``` + +- *Type:* cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +```python +provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]] +``` + +- *Type:* typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] + +--- + +##### `backend`Required + +```python +backend: str +``` + +- *Type:* str + +Path where the GCP secrets engine is mounted. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} + +--- + +##### `impersonated_account`Required + +```python +impersonated_account: str +``` + +- *Type:* str + +Name of the Impersonated Account to create. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} + +--- + +##### `service_account_email`Required + +```python +service_account_email: str +``` + +- *Type:* str + +Email of the GCP service account. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} + +--- + +##### `id`Optional + +```python +id: str +``` + +- *Type:* str + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. + +Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. +If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + +--- + +##### `namespace`Optional + +```python +namespace: str +``` + +- *Type:* str + +Target namespace. (requires Enterprise). + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} + +--- + +##### `token_scopes`Optional + +```python +token_scopes: typing.List[str] +``` + +- *Type:* typing.List[str] + +List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} + +--- + + + diff --git a/docs/gcpSecretImpersonatedAccount.typescript.md b/docs/gcpSecretImpersonatedAccount.typescript.md new file mode 100644 index 000000000..efdbe01ba --- /dev/null +++ b/docs/gcpSecretImpersonatedAccount.typescript.md @@ -0,0 +1,859 @@ +# `gcpSecretImpersonatedAccount` Submodule + +## Constructs + +### GcpSecretImpersonatedAccount + +Represents a {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}. + +#### Initializers + +```typescript +import { gcpSecretImpersonatedAccount } from '@cdktf/provider-vault' + +new gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccount(scope: Construct, id: string, config: GcpSecretImpersonatedAccountConfig) +``` + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| scope | constructs.Construct | The scope in which to define this construct. | +| id | string | The scoped construct ID. | +| config | GcpSecretImpersonatedAccountConfig | *No description.* | + +--- + +##### `scope`Required + +- *Type:* constructs.Construct + +The scope in which to define this construct. + +--- + +##### `id`Required + +- *Type:* string + +The scoped construct ID. + +Must be unique amongst siblings in the same scope + +--- + +##### `config`Required + +- *Type:* GcpSecretImpersonatedAccountConfig + +--- + +#### Methods + +| **Name** | **Description** | +| --- | --- | +| toString | Returns a string representation of this construct. | +| addOverride | *No description.* | +| overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | +| resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toMetadata | *No description.* | +| toTerraform | Adds this resource to the terraform JSON output. | +| getAnyMapAttribute | *No description.* | +| getBooleanAttribute | *No description.* | +| getBooleanMapAttribute | *No description.* | +| getListAttribute | *No description.* | +| getNumberAttribute | *No description.* | +| getNumberListAttribute | *No description.* | +| getNumberMapAttribute | *No description.* | +| getStringAttribute | *No description.* | +| getStringMapAttribute | *No description.* | +| interpolationForAttribute | *No description.* | +| resetId | *No description.* | +| resetNamespace | *No description.* | +| resetTokenScopes | *No description.* | + +--- + +##### `toString` + +```typescript +public toString(): string +``` + +Returns a string representation of this construct. + +##### `addOverride` + +```typescript +public addOverride(path: string, value: any): void +``` + +###### `path`Required + +- *Type:* string + +--- + +###### `value`Required + +- *Type:* any + +--- + +##### `overrideLogicalId` + +```typescript +public overrideLogicalId(newLogicalId: string): void +``` + +Overrides the auto-generated logical ID with a specific ID. + +###### `newLogicalId`Required + +- *Type:* string + +The new logical ID to use for this stack element. + +--- + +##### `resetOverrideLogicalId` + +```typescript +public resetOverrideLogicalId(): void +``` + +Resets a previously passed logical Id to use the auto-generated logical id again. + +##### `toMetadata` + +```typescript +public toMetadata(): any +``` + +##### `toTerraform` + +```typescript +public toTerraform(): any +``` + +Adds this resource to the terraform JSON output. + +##### `getAnyMapAttribute` + +```typescript +public getAnyMapAttribute(terraformAttribute: string): {[ key: string ]: any} +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getBooleanAttribute` + +```typescript +public getBooleanAttribute(terraformAttribute: string): IResolvable +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getBooleanMapAttribute` + +```typescript +public getBooleanMapAttribute(terraformAttribute: string): {[ key: string ]: boolean} +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getListAttribute` + +```typescript +public getListAttribute(terraformAttribute: string): string[] +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getNumberAttribute` + +```typescript +public getNumberAttribute(terraformAttribute: string): number +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getNumberListAttribute` + +```typescript +public getNumberListAttribute(terraformAttribute: string): number[] +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getNumberMapAttribute` + +```typescript +public getNumberMapAttribute(terraformAttribute: string): {[ key: string ]: number} +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getStringAttribute` + +```typescript +public getStringAttribute(terraformAttribute: string): string +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getStringMapAttribute` + +```typescript +public getStringMapAttribute(terraformAttribute: string): {[ key: string ]: string} +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `interpolationForAttribute` + +```typescript +public interpolationForAttribute(terraformAttribute: string): IResolvable +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `resetId` + +```typescript +public resetId(): void +``` + +##### `resetNamespace` + +```typescript +public resetNamespace(): void +``` + +##### `resetTokenScopes` + +```typescript +public resetTokenScopes(): void +``` + +#### Static Functions + +| **Name** | **Description** | +| --- | --- | +| isConstruct | Checks if `x` is a construct. | +| isTerraformElement | *No description.* | +| isTerraformResource | *No description.* | + +--- + +##### `isConstruct` + +```typescript +import { gcpSecretImpersonatedAccount } from '@cdktf/provider-vault' + +gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccount.isConstruct(x: any) +``` + +Checks if `x` is a construct. + +Use this method instead of `instanceof` to properly detect `Construct` +instances, even when the construct library is symlinked. + +Explanation: in JavaScript, multiple copies of the `constructs` library on +disk are seen as independent, completely different libraries. As a +consequence, the class `Construct` in each copy of the `constructs` library +is seen as a different class, and an instance of one class will not test as +`instanceof` the other class. `npm install` will not create installations +like this, but users may manually symlink construct libraries together or +use a monorepo tool: in those cases, multiple copies of the `constructs` +library can be accidentally installed, and `instanceof` will behave +unpredictably. It is safest to avoid using `instanceof`, and using +this type-testing method instead. + +###### `x`Required + +- *Type:* any + +Any object. + +--- + +##### `isTerraformElement` + +```typescript +import { gcpSecretImpersonatedAccount } from '@cdktf/provider-vault' + +gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccount.isTerraformElement(x: any) +``` + +###### `x`Required + +- *Type:* any + +--- + +##### `isTerraformResource` + +```typescript +import { gcpSecretImpersonatedAccount } from '@cdktf/provider-vault' + +gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccount.isTerraformResource(x: any) +``` + +###### `x`Required + +- *Type:* any + +--- + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| node | constructs.Node | The tree node. | +| cdktfStack | cdktf.TerraformStack | *No description.* | +| fqn | string | *No description.* | +| friendlyUniqueId | string | *No description.* | +| terraformMetaArguments | {[ key: string ]: any} | *No description.* | +| terraformResourceType | string | *No description.* | +| terraformGeneratorMetadata | cdktf.TerraformProviderGeneratorMetadata | *No description.* | +| connection | cdktf.SSHProvisionerConnection \| cdktf.WinrmProvisionerConnection | *No description.* | +| count | number | *No description.* | +| dependsOn | string[] | *No description.* | +| forEach | cdktf.ITerraformIterator | *No description.* | +| lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | +| provider | cdktf.TerraformProvider | *No description.* | +| provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | +| serviceAccountProject | string | *No description.* | +| backendInput | string | *No description.* | +| idInput | string | *No description.* | +| impersonatedAccountInput | string | *No description.* | +| namespaceInput | string | *No description.* | +| serviceAccountEmailInput | string | *No description.* | +| tokenScopesInput | string[] | *No description.* | +| backend | string | *No description.* | +| id | string | *No description.* | +| impersonatedAccount | string | *No description.* | +| namespace | string | *No description.* | +| serviceAccountEmail | string | *No description.* | +| tokenScopes | string[] | *No description.* | + +--- + +##### `node`Required + +```typescript +public readonly node: Node; +``` + +- *Type:* constructs.Node + +The tree node. + +--- + +##### `cdktfStack`Required + +```typescript +public readonly cdktfStack: TerraformStack; +``` + +- *Type:* cdktf.TerraformStack + +--- + +##### `fqn`Required + +```typescript +public readonly fqn: string; +``` + +- *Type:* string + +--- + +##### `friendlyUniqueId`Required + +```typescript +public readonly friendlyUniqueId: string; +``` + +- *Type:* string + +--- + +##### `terraformMetaArguments`Required + +```typescript +public readonly terraformMetaArguments: {[ key: string ]: any}; +``` + +- *Type:* {[ key: string ]: any} + +--- + +##### `terraformResourceType`Required + +```typescript +public readonly terraformResourceType: string; +``` + +- *Type:* string + +--- + +##### `terraformGeneratorMetadata`Optional + +```typescript +public readonly terraformGeneratorMetadata: TerraformProviderGeneratorMetadata; +``` + +- *Type:* cdktf.TerraformProviderGeneratorMetadata + +--- + +##### `connection`Optional + +```typescript +public readonly connection: SSHProvisionerConnection | WinrmProvisionerConnection; +``` + +- *Type:* cdktf.SSHProvisionerConnection | cdktf.WinrmProvisionerConnection + +--- + +##### `count`Optional + +```typescript +public readonly count: number; +``` + +- *Type:* number + +--- + +##### `dependsOn`Optional + +```typescript +public readonly dependsOn: string[]; +``` + +- *Type:* string[] + +--- + +##### `forEach`Optional + +```typescript +public readonly forEach: ITerraformIterator; +``` + +- *Type:* cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +```typescript +public readonly lifecycle: TerraformResourceLifecycle; +``` + +- *Type:* cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +```typescript +public readonly provider: TerraformProvider; +``` + +- *Type:* cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +```typescript +public readonly provisioners: FileProvisioner | LocalExecProvisioner | RemoteExecProvisioner[]; +``` + +- *Type:* cdktf.FileProvisioner | cdktf.LocalExecProvisioner | cdktf.RemoteExecProvisioner[] + +--- + +##### `serviceAccountProject`Required + +```typescript +public readonly serviceAccountProject: string; +``` + +- *Type:* string + +--- + +##### `backendInput`Optional + +```typescript +public readonly backendInput: string; +``` + +- *Type:* string + +--- + +##### `idInput`Optional + +```typescript +public readonly idInput: string; +``` + +- *Type:* string + +--- + +##### `impersonatedAccountInput`Optional + +```typescript +public readonly impersonatedAccountInput: string; +``` + +- *Type:* string + +--- + +##### `namespaceInput`Optional + +```typescript +public readonly namespaceInput: string; +``` + +- *Type:* string + +--- + +##### `serviceAccountEmailInput`Optional + +```typescript +public readonly serviceAccountEmailInput: string; +``` + +- *Type:* string + +--- + +##### `tokenScopesInput`Optional + +```typescript +public readonly tokenScopesInput: string[]; +``` + +- *Type:* string[] + +--- + +##### `backend`Required + +```typescript +public readonly backend: string; +``` + +- *Type:* string + +--- + +##### `id`Required + +```typescript +public readonly id: string; +``` + +- *Type:* string + +--- + +##### `impersonatedAccount`Required + +```typescript +public readonly impersonatedAccount: string; +``` + +- *Type:* string + +--- + +##### `namespace`Required + +```typescript +public readonly namespace: string; +``` + +- *Type:* string + +--- + +##### `serviceAccountEmail`Required + +```typescript +public readonly serviceAccountEmail: string; +``` + +- *Type:* string + +--- + +##### `tokenScopes`Required + +```typescript +public readonly tokenScopes: string[]; +``` + +- *Type:* string[] + +--- + +#### Constants + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| tfResourceType | string | *No description.* | + +--- + +##### `tfResourceType`Required + +```typescript +public readonly tfResourceType: string; +``` + +- *Type:* string + +--- + +## Structs + +### GcpSecretImpersonatedAccountConfig + +#### Initializer + +```typescript +import { gcpSecretImpersonatedAccount } from '@cdktf/provider-vault' + +const gcpSecretImpersonatedAccountConfig: gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccountConfig = { ... } +``` + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| connection | cdktf.SSHProvisionerConnection \| cdktf.WinrmProvisionerConnection | *No description.* | +| count | number | *No description.* | +| dependsOn | cdktf.ITerraformDependable[] | *No description.* | +| forEach | cdktf.ITerraformIterator | *No description.* | +| lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | +| provider | cdktf.TerraformProvider | *No description.* | +| provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | +| backend | string | Path where the GCP secrets engine is mounted. | +| impersonatedAccount | string | Name of the Impersonated Account to create. | +| serviceAccountEmail | string | Email of the GCP service account. | +| id | string | Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | +| namespace | string | Target namespace. (requires Enterprise). | +| tokenScopes | string[] | List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). | + +--- + +##### `connection`Optional + +```typescript +public readonly connection: SSHProvisionerConnection | WinrmProvisionerConnection; +``` + +- *Type:* cdktf.SSHProvisionerConnection | cdktf.WinrmProvisionerConnection + +--- + +##### `count`Optional + +```typescript +public readonly count: number; +``` + +- *Type:* number + +--- + +##### `dependsOn`Optional + +```typescript +public readonly dependsOn: ITerraformDependable[]; +``` + +- *Type:* cdktf.ITerraformDependable[] + +--- + +##### `forEach`Optional + +```typescript +public readonly forEach: ITerraformIterator; +``` + +- *Type:* cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +```typescript +public readonly lifecycle: TerraformResourceLifecycle; +``` + +- *Type:* cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +```typescript +public readonly provider: TerraformProvider; +``` + +- *Type:* cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +```typescript +public readonly provisioners: FileProvisioner | LocalExecProvisioner | RemoteExecProvisioner[]; +``` + +- *Type:* cdktf.FileProvisioner | cdktf.LocalExecProvisioner | cdktf.RemoteExecProvisioner[] + +--- + +##### `backend`Required + +```typescript +public readonly backend: string; +``` + +- *Type:* string + +Path where the GCP secrets engine is mounted. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} + +--- + +##### `impersonatedAccount`Required + +```typescript +public readonly impersonatedAccount: string; +``` + +- *Type:* string + +Name of the Impersonated Account to create. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} + +--- + +##### `serviceAccountEmail`Required + +```typescript +public readonly serviceAccountEmail: string; +``` + +- *Type:* string + +Email of the GCP service account. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} + +--- + +##### `id`Optional + +```typescript +public readonly id: string; +``` + +- *Type:* string + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. + +Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. +If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + +--- + +##### `namespace`Optional + +```typescript +public readonly namespace: string; +``` + +- *Type:* string + +Target namespace. (requires Enterprise). + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} + +--- + +##### `tokenScopes`Optional + +```typescript +public readonly tokenScopes: string[]; +``` + +- *Type:* string[] + +List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} + +--- + + + diff --git a/docs/pkiSecretBackendCrlConfig.csharp.md b/docs/pkiSecretBackendCrlConfig.csharp.md index 016c7d15f..da6704caf 100644 --- a/docs/pkiSecretBackendCrlConfig.csharp.md +++ b/docs/pkiSecretBackendCrlConfig.csharp.md @@ -68,6 +68,7 @@ Must be unique amongst siblings in the same scope | InterpolationForAttribute | *No description.* | | ResetAutoRebuild | *No description.* | | ResetAutoRebuildGracePeriod | *No description.* | +| ResetCrossClusterRevocation | *No description.* | | ResetDeltaRebuildInterval | *No description.* | | ResetDisable | *No description.* | | ResetEnableDelta | *No description.* | @@ -76,6 +77,8 @@ Must be unique amongst siblings in the same scope | ResetNamespace | *No description.* | | ResetOcspDisable | *No description.* | | ResetOcspExpiry | *No description.* | +| ResetUnifiedCrl | *No description.* | +| ResetUnifiedCrlOnExistingPaths | *No description.* | --- @@ -275,6 +278,12 @@ private void ResetAutoRebuild() private void ResetAutoRebuildGracePeriod() ``` +##### `ResetCrossClusterRevocation` + +```csharp +private void ResetCrossClusterRevocation() +``` + ##### `ResetDeltaRebuildInterval` ```csharp @@ -323,6 +332,18 @@ private void ResetOcspDisable() private void ResetOcspExpiry() ``` +##### `ResetUnifiedCrl` + +```csharp +private void ResetUnifiedCrl() +``` + +##### `ResetUnifiedCrlOnExistingPaths` + +```csharp +private void ResetUnifiedCrlOnExistingPaths() +``` + #### Static Functions | **Name** | **Description** | @@ -414,6 +435,7 @@ PkiSecretBackendCrlConfig.IsTerraformResource(object X); | AutoRebuildGracePeriodInput | string | *No description.* | | AutoRebuildInput | object | *No description.* | | BackendInput | string | *No description.* | +| CrossClusterRevocationInput | object | *No description.* | | DeltaRebuildIntervalInput | string | *No description.* | | DisableInput | object | *No description.* | | EnableDeltaInput | object | *No description.* | @@ -422,9 +444,12 @@ PkiSecretBackendCrlConfig.IsTerraformResource(object X); | NamespaceInput | string | *No description.* | | OcspDisableInput | object | *No description.* | | OcspExpiryInput | string | *No description.* | +| UnifiedCrlInput | object | *No description.* | +| UnifiedCrlOnExistingPathsInput | object | *No description.* | | AutoRebuild | object | *No description.* | | AutoRebuildGracePeriod | string | *No description.* | | Backend | string | *No description.* | +| CrossClusterRevocation | object | *No description.* | | DeltaRebuildInterval | string | *No description.* | | Disable | object | *No description.* | | EnableDelta | object | *No description.* | @@ -433,6 +458,8 @@ PkiSecretBackendCrlConfig.IsTerraformResource(object X); | Namespace | string | *No description.* | | OcspDisable | object | *No description.* | | OcspExpiry | string | *No description.* | +| UnifiedCrl | object | *No description.* | +| UnifiedCrlOnExistingPaths | object | *No description.* | --- @@ -608,6 +635,16 @@ public string BackendInput { get; } --- +##### `CrossClusterRevocationInput`Optional + +```csharp +public object CrossClusterRevocationInput { get; } +``` + +- *Type:* object + +--- + ##### `DeltaRebuildIntervalInput`Optional ```csharp @@ -688,6 +725,26 @@ public string OcspExpiryInput { get; } --- +##### `UnifiedCrlInput`Optional + +```csharp +public object UnifiedCrlInput { get; } +``` + +- *Type:* object + +--- + +##### `UnifiedCrlOnExistingPathsInput`Optional + +```csharp +public object UnifiedCrlOnExistingPathsInput { get; } +``` + +- *Type:* object + +--- + ##### `AutoRebuild`Required ```csharp @@ -718,6 +775,16 @@ public string Backend { get; } --- +##### `CrossClusterRevocation`Required + +```csharp +public object CrossClusterRevocation { get; } +``` + +- *Type:* object + +--- + ##### `DeltaRebuildInterval`Required ```csharp @@ -798,6 +865,26 @@ public string OcspExpiry { get; } --- +##### `UnifiedCrl`Required + +```csharp +public object UnifiedCrl { get; } +``` + +- *Type:* object + +--- + +##### `UnifiedCrlOnExistingPaths`Required + +```csharp +public object UnifiedCrlOnExistingPaths { get; } +``` + +- *Type:* object + +--- + #### Constants | **Name** | **Type** | **Description** | @@ -836,6 +923,7 @@ new PkiSecretBackendCrlConfigConfig { string Backend, object AutoRebuild = null, string AutoRebuildGracePeriod = null, + object CrossClusterRevocation = null, string DeltaRebuildInterval = null, object Disable = null, object EnableDelta = null, @@ -843,7 +931,9 @@ new PkiSecretBackendCrlConfigConfig { string Id = null, string Namespace = null, object OcspDisable = null, - string OcspExpiry = null + string OcspExpiry = null, + object UnifiedCrl = null, + object UnifiedCrlOnExistingPaths = null }; ``` @@ -861,6 +951,7 @@ new PkiSecretBackendCrlConfigConfig { | Backend | string | The path of the PKI secret backend the resource belongs to. | | AutoRebuild | object | Enables or disables periodic rebuilding of the CRL upon expiry. | | AutoRebuildGracePeriod | string | Grace period before CRL expiry to attempt rebuild of CRL. | +| CrossClusterRevocation | object | Enable cross-cluster revocation request queues. | | DeltaRebuildInterval | string | Interval to check for new revocations on, to regenerate the delta CRL. | | Disable | object | Disables or enables CRL building. | | EnableDelta | object | Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL. | @@ -869,6 +960,8 @@ new PkiSecretBackendCrlConfigConfig { | Namespace | string | Target namespace. (requires Enterprise). | | OcspDisable | object | Disables or enables the OCSP responder in Vault. | | OcspExpiry | string | The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations. | +| UnifiedCrl | object | Enables unified CRL and OCSP building. | +| UnifiedCrlOnExistingPaths | object | Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. | --- @@ -984,6 +1077,20 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault --- +##### `CrossClusterRevocation`Optional + +```csharp +public object CrossClusterRevocation { get; set; } +``` + +- *Type:* object + +Enable cross-cluster revocation request queues. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation} + +--- + ##### `DeltaRebuildInterval`Optional ```csharp @@ -1097,5 +1204,33 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault --- +##### `UnifiedCrl`Optional + +```csharp +public object UnifiedCrl { get; set; } +``` + +- *Type:* object + +Enables unified CRL and OCSP building. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl} + +--- + +##### `UnifiedCrlOnExistingPaths`Optional + +```csharp +public object UnifiedCrlOnExistingPaths { get; set; } +``` + +- *Type:* object + +Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths} + +--- + diff --git a/docs/pkiSecretBackendCrlConfig.go.md b/docs/pkiSecretBackendCrlConfig.go.md index 8fd4d72e3..8371f10e6 100644 --- a/docs/pkiSecretBackendCrlConfig.go.md +++ b/docs/pkiSecretBackendCrlConfig.go.md @@ -68,6 +68,7 @@ Must be unique amongst siblings in the same scope | InterpolationForAttribute | *No description.* | | ResetAutoRebuild | *No description.* | | ResetAutoRebuildGracePeriod | *No description.* | +| ResetCrossClusterRevocation | *No description.* | | ResetDeltaRebuildInterval | *No description.* | | ResetDisable | *No description.* | | ResetEnableDelta | *No description.* | @@ -76,6 +77,8 @@ Must be unique amongst siblings in the same scope | ResetNamespace | *No description.* | | ResetOcspDisable | *No description.* | | ResetOcspExpiry | *No description.* | +| ResetUnifiedCrl | *No description.* | +| ResetUnifiedCrlOnExistingPaths | *No description.* | --- @@ -275,6 +278,12 @@ func ResetAutoRebuild() func ResetAutoRebuildGracePeriod() ``` +##### `ResetCrossClusterRevocation` + +```go +func ResetCrossClusterRevocation() +``` + ##### `ResetDeltaRebuildInterval` ```go @@ -323,6 +332,18 @@ func ResetOcspDisable() func ResetOcspExpiry() ``` +##### `ResetUnifiedCrl` + +```go +func ResetUnifiedCrl() +``` + +##### `ResetUnifiedCrlOnExistingPaths` + +```go +func ResetUnifiedCrlOnExistingPaths() +``` + #### Static Functions | **Name** | **Description** | @@ -414,6 +435,7 @@ pkisecretbackendcrlconfig.PkiSecretBackendCrlConfig_IsTerraformResource(x interf | AutoRebuildGracePeriodInput | *string | *No description.* | | AutoRebuildInput | interface{} | *No description.* | | BackendInput | *string | *No description.* | +| CrossClusterRevocationInput | interface{} | *No description.* | | DeltaRebuildIntervalInput | *string | *No description.* | | DisableInput | interface{} | *No description.* | | EnableDeltaInput | interface{} | *No description.* | @@ -422,9 +444,12 @@ pkisecretbackendcrlconfig.PkiSecretBackendCrlConfig_IsTerraformResource(x interf | NamespaceInput | *string | *No description.* | | OcspDisableInput | interface{} | *No description.* | | OcspExpiryInput | *string | *No description.* | +| UnifiedCrlInput | interface{} | *No description.* | +| UnifiedCrlOnExistingPathsInput | interface{} | *No description.* | | AutoRebuild | interface{} | *No description.* | | AutoRebuildGracePeriod | *string | *No description.* | | Backend | *string | *No description.* | +| CrossClusterRevocation | interface{} | *No description.* | | DeltaRebuildInterval | *string | *No description.* | | Disable | interface{} | *No description.* | | EnableDelta | interface{} | *No description.* | @@ -433,6 +458,8 @@ pkisecretbackendcrlconfig.PkiSecretBackendCrlConfig_IsTerraformResource(x interf | Namespace | *string | *No description.* | | OcspDisable | interface{} | *No description.* | | OcspExpiry | *string | *No description.* | +| UnifiedCrl | interface{} | *No description.* | +| UnifiedCrlOnExistingPaths | interface{} | *No description.* | --- @@ -608,6 +635,16 @@ func BackendInput() *string --- +##### `CrossClusterRevocationInput`Optional + +```go +func CrossClusterRevocationInput() interface{} +``` + +- *Type:* interface{} + +--- + ##### `DeltaRebuildIntervalInput`Optional ```go @@ -688,6 +725,26 @@ func OcspExpiryInput() *string --- +##### `UnifiedCrlInput`Optional + +```go +func UnifiedCrlInput() interface{} +``` + +- *Type:* interface{} + +--- + +##### `UnifiedCrlOnExistingPathsInput`Optional + +```go +func UnifiedCrlOnExistingPathsInput() interface{} +``` + +- *Type:* interface{} + +--- + ##### `AutoRebuild`Required ```go @@ -718,6 +775,16 @@ func Backend() *string --- +##### `CrossClusterRevocation`Required + +```go +func CrossClusterRevocation() interface{} +``` + +- *Type:* interface{} + +--- + ##### `DeltaRebuildInterval`Required ```go @@ -798,6 +865,26 @@ func OcspExpiry() *string --- +##### `UnifiedCrl`Required + +```go +func UnifiedCrl() interface{} +``` + +- *Type:* interface{} + +--- + +##### `UnifiedCrlOnExistingPaths`Required + +```go +func UnifiedCrlOnExistingPaths() interface{} +``` + +- *Type:* interface{} + +--- + #### Constants | **Name** | **Type** | **Description** | @@ -836,6 +923,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v5/pkisecretbackendcrlcon Backend: *string, AutoRebuild: interface{}, AutoRebuildGracePeriod: *string, + CrossClusterRevocation: interface{}, DeltaRebuildInterval: *string, Disable: interface{}, EnableDelta: interface{}, @@ -844,6 +932,8 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v5/pkisecretbackendcrlcon Namespace: *string, OcspDisable: interface{}, OcspExpiry: *string, + UnifiedCrl: interface{}, + UnifiedCrlOnExistingPaths: interface{}, } ``` @@ -861,6 +951,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v5/pkisecretbackendcrlcon | Backend | *string | The path of the PKI secret backend the resource belongs to. | | AutoRebuild | interface{} | Enables or disables periodic rebuilding of the CRL upon expiry. | | AutoRebuildGracePeriod | *string | Grace period before CRL expiry to attempt rebuild of CRL. | +| CrossClusterRevocation | interface{} | Enable cross-cluster revocation request queues. | | DeltaRebuildInterval | *string | Interval to check for new revocations on, to regenerate the delta CRL. | | Disable | interface{} | Disables or enables CRL building. | | EnableDelta | interface{} | Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL. | @@ -869,6 +960,8 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v5/pkisecretbackendcrlcon | Namespace | *string | Target namespace. (requires Enterprise). | | OcspDisable | interface{} | Disables or enables the OCSP responder in Vault. | | OcspExpiry | *string | The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations. | +| UnifiedCrl | interface{} | Enables unified CRL and OCSP building. | +| UnifiedCrlOnExistingPaths | interface{} | Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. | --- @@ -984,6 +1077,20 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault --- +##### `CrossClusterRevocation`Optional + +```go +CrossClusterRevocation interface{} +``` + +- *Type:* interface{} + +Enable cross-cluster revocation request queues. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation} + +--- + ##### `DeltaRebuildInterval`Optional ```go @@ -1097,5 +1204,33 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault --- +##### `UnifiedCrl`Optional + +```go +UnifiedCrl interface{} +``` + +- *Type:* interface{} + +Enables unified CRL and OCSP building. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl} + +--- + +##### `UnifiedCrlOnExistingPaths`Optional + +```go +UnifiedCrlOnExistingPaths interface{} +``` + +- *Type:* interface{} + +Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths} + +--- + diff --git a/docs/pkiSecretBackendCrlConfig.java.md b/docs/pkiSecretBackendCrlConfig.java.md index 10213cd59..fbf72e779 100644 --- a/docs/pkiSecretBackendCrlConfig.java.md +++ b/docs/pkiSecretBackendCrlConfig.java.md @@ -26,6 +26,8 @@ PkiSecretBackendCrlConfig.Builder.create(Construct scope, java.lang.String id) // .autoRebuild(java.lang.Boolean) // .autoRebuild(IResolvable) // .autoRebuildGracePeriod(java.lang.String) +// .crossClusterRevocation(java.lang.Boolean) +// .crossClusterRevocation(IResolvable) // .deltaRebuildInterval(java.lang.String) // .disable(java.lang.Boolean) // .disable(IResolvable) @@ -37,6 +39,10 @@ PkiSecretBackendCrlConfig.Builder.create(Construct scope, java.lang.String id) // .ocspDisable(java.lang.Boolean) // .ocspDisable(IResolvable) // .ocspExpiry(java.lang.String) +// .unifiedCrl(java.lang.Boolean) +// .unifiedCrl(IResolvable) +// .unifiedCrlOnExistingPaths(java.lang.Boolean) +// .unifiedCrlOnExistingPaths(IResolvable) .build(); ``` @@ -54,6 +60,7 @@ PkiSecretBackendCrlConfig.Builder.create(Construct scope, java.lang.String id) | backend | java.lang.String | The path of the PKI secret backend the resource belongs to. | | autoRebuild | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enables or disables periodic rebuilding of the CRL upon expiry. | | autoRebuildGracePeriod | java.lang.String | Grace period before CRL expiry to attempt rebuild of CRL. | +| crossClusterRevocation | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enable cross-cluster revocation request queues. | | deltaRebuildInterval | java.lang.String | Interval to check for new revocations on, to regenerate the delta CRL. | | disable | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Disables or enables CRL building. | | enableDelta | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL. | @@ -62,6 +69,8 @@ PkiSecretBackendCrlConfig.Builder.create(Construct scope, java.lang.String id) | namespace | java.lang.String | Target namespace. (requires Enterprise). | | ocspDisable | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Disables or enables the OCSP responder in Vault. | | ocspExpiry | java.lang.String | The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations. | +| unifiedCrl | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enables unified CRL and OCSP building. | +| unifiedCrlOnExistingPaths | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. | --- @@ -155,6 +164,16 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault --- +##### `crossClusterRevocation`Optional + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +Enable cross-cluster revocation request queues. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation} + +--- + ##### `deltaRebuildInterval`Optional - *Type:* java.lang.String @@ -236,6 +255,26 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault --- +##### `unifiedCrl`Optional + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +Enables unified CRL and OCSP building. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl} + +--- + +##### `unifiedCrlOnExistingPaths`Optional + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths} + +--- + #### Methods | **Name** | **Description** | @@ -258,6 +297,7 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault | interpolationForAttribute | *No description.* | | resetAutoRebuild | *No description.* | | resetAutoRebuildGracePeriod | *No description.* | +| resetCrossClusterRevocation | *No description.* | | resetDeltaRebuildInterval | *No description.* | | resetDisable | *No description.* | | resetEnableDelta | *No description.* | @@ -266,6 +306,8 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault | resetNamespace | *No description.* | | resetOcspDisable | *No description.* | | resetOcspExpiry | *No description.* | +| resetUnifiedCrl | *No description.* | +| resetUnifiedCrlOnExistingPaths | *No description.* | --- @@ -465,6 +507,12 @@ public void resetAutoRebuild() public void resetAutoRebuildGracePeriod() ``` +##### `resetCrossClusterRevocation` + +```java +public void resetCrossClusterRevocation() +``` + ##### `resetDeltaRebuildInterval` ```java @@ -513,6 +561,18 @@ public void resetOcspDisable() public void resetOcspExpiry() ``` +##### `resetUnifiedCrl` + +```java +public void resetUnifiedCrl() +``` + +##### `resetUnifiedCrlOnExistingPaths` + +```java +public void resetUnifiedCrlOnExistingPaths() +``` + #### Static Functions | **Name** | **Description** | @@ -604,6 +664,7 @@ PkiSecretBackendCrlConfig.isTerraformResource(java.lang.Object x) | autoRebuildGracePeriodInput | java.lang.String | *No description.* | | autoRebuildInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | backendInput | java.lang.String | *No description.* | +| crossClusterRevocationInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | deltaRebuildIntervalInput | java.lang.String | *No description.* | | disableInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | enableDeltaInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | @@ -612,9 +673,12 @@ PkiSecretBackendCrlConfig.isTerraformResource(java.lang.Object x) | namespaceInput | java.lang.String | *No description.* | | ocspDisableInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | ocspExpiryInput | java.lang.String | *No description.* | +| unifiedCrlInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | +| unifiedCrlOnExistingPathsInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | autoRebuild | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | autoRebuildGracePeriod | java.lang.String | *No description.* | | backend | java.lang.String | *No description.* | +| crossClusterRevocation | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | deltaRebuildInterval | java.lang.String | *No description.* | | disable | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | enableDelta | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | @@ -623,6 +687,8 @@ PkiSecretBackendCrlConfig.isTerraformResource(java.lang.Object x) | namespace | java.lang.String | *No description.* | | ocspDisable | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | ocspExpiry | java.lang.String | *No description.* | +| unifiedCrl | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | +| unifiedCrlOnExistingPaths | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | --- @@ -798,6 +864,16 @@ public java.lang.String getBackendInput(); --- +##### `crossClusterRevocationInput`Optional + +```java +public java.lang.Object getCrossClusterRevocationInput(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +--- + ##### `deltaRebuildIntervalInput`Optional ```java @@ -878,6 +954,26 @@ public java.lang.String getOcspExpiryInput(); --- +##### `unifiedCrlInput`Optional + +```java +public java.lang.Object getUnifiedCrlInput(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +--- + +##### `unifiedCrlOnExistingPathsInput`Optional + +```java +public java.lang.Object getUnifiedCrlOnExistingPathsInput(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +--- + ##### `autoRebuild`Required ```java @@ -908,6 +1004,16 @@ public java.lang.String getBackend(); --- +##### `crossClusterRevocation`Required + +```java +public java.lang.Object getCrossClusterRevocation(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +--- + ##### `deltaRebuildInterval`Required ```java @@ -988,6 +1094,26 @@ public java.lang.String getOcspExpiry(); --- +##### `unifiedCrl`Required + +```java +public java.lang.Object getUnifiedCrl(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +--- + +##### `unifiedCrlOnExistingPaths`Required + +```java +public java.lang.Object getUnifiedCrlOnExistingPaths(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +--- + #### Constants | **Name** | **Type** | **Description** | @@ -1030,6 +1156,8 @@ PkiSecretBackendCrlConfigConfig.builder() // .autoRebuild(java.lang.Boolean) // .autoRebuild(IResolvable) // .autoRebuildGracePeriod(java.lang.String) +// .crossClusterRevocation(java.lang.Boolean) +// .crossClusterRevocation(IResolvable) // .deltaRebuildInterval(java.lang.String) // .disable(java.lang.Boolean) // .disable(IResolvable) @@ -1041,6 +1169,10 @@ PkiSecretBackendCrlConfigConfig.builder() // .ocspDisable(java.lang.Boolean) // .ocspDisable(IResolvable) // .ocspExpiry(java.lang.String) +// .unifiedCrl(java.lang.Boolean) +// .unifiedCrl(IResolvable) +// .unifiedCrlOnExistingPaths(java.lang.Boolean) +// .unifiedCrlOnExistingPaths(IResolvable) .build(); ``` @@ -1058,6 +1190,7 @@ PkiSecretBackendCrlConfigConfig.builder() | backend | java.lang.String | The path of the PKI secret backend the resource belongs to. | | autoRebuild | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enables or disables periodic rebuilding of the CRL upon expiry. | | autoRebuildGracePeriod | java.lang.String | Grace period before CRL expiry to attempt rebuild of CRL. | +| crossClusterRevocation | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enable cross-cluster revocation request queues. | | deltaRebuildInterval | java.lang.String | Interval to check for new revocations on, to regenerate the delta CRL. | | disable | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Disables or enables CRL building. | | enableDelta | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL. | @@ -1066,6 +1199,8 @@ PkiSecretBackendCrlConfigConfig.builder() | namespace | java.lang.String | Target namespace. (requires Enterprise). | | ocspDisable | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Disables or enables the OCSP responder in Vault. | | ocspExpiry | java.lang.String | The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations. | +| unifiedCrl | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enables unified CRL and OCSP building. | +| unifiedCrlOnExistingPaths | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. | --- @@ -1181,6 +1316,20 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault --- +##### `crossClusterRevocation`Optional + +```java +public java.lang.Object getCrossClusterRevocation(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +Enable cross-cluster revocation request queues. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation} + +--- + ##### `deltaRebuildInterval`Optional ```java @@ -1294,5 +1443,33 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault --- +##### `unifiedCrl`Optional + +```java +public java.lang.Object getUnifiedCrl(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +Enables unified CRL and OCSP building. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl} + +--- + +##### `unifiedCrlOnExistingPaths`Optional + +```java +public java.lang.Object getUnifiedCrlOnExistingPaths(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths} + +--- + diff --git a/docs/pkiSecretBackendCrlConfig.python.md b/docs/pkiSecretBackendCrlConfig.python.md index df0716f93..7acf33c8d 100644 --- a/docs/pkiSecretBackendCrlConfig.python.md +++ b/docs/pkiSecretBackendCrlConfig.python.md @@ -24,6 +24,7 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfig( backend: str, auto_rebuild: typing.Union[bool, IResolvable] = None, auto_rebuild_grace_period: str = None, + cross_cluster_revocation: typing.Union[bool, IResolvable] = None, delta_rebuild_interval: str = None, disable: typing.Union[bool, IResolvable] = None, enable_delta: typing.Union[bool, IResolvable] = None, @@ -31,7 +32,9 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfig( id: str = None, namespace: str = None, ocsp_disable: typing.Union[bool, IResolvable] = None, - ocsp_expiry: str = None + ocsp_expiry: str = None, + unified_crl: typing.Union[bool, IResolvable] = None, + unified_crl_on_existing_paths: typing.Union[bool, IResolvable] = None ) ``` @@ -49,6 +52,7 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfig( | backend | str | The path of the PKI secret backend the resource belongs to. | | auto_rebuild | typing.Union[bool, cdktf.IResolvable] | Enables or disables periodic rebuilding of the CRL upon expiry. | | auto_rebuild_grace_period | str | Grace period before CRL expiry to attempt rebuild of CRL. | +| cross_cluster_revocation | typing.Union[bool, cdktf.IResolvable] | Enable cross-cluster revocation request queues. | | delta_rebuild_interval | str | Interval to check for new revocations on, to regenerate the delta CRL. | | disable | typing.Union[bool, cdktf.IResolvable] | Disables or enables CRL building. | | enable_delta | typing.Union[bool, cdktf.IResolvable] | Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL. | @@ -57,6 +61,8 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfig( | namespace | str | Target namespace. (requires Enterprise). | | ocsp_disable | typing.Union[bool, cdktf.IResolvable] | Disables or enables the OCSP responder in Vault. | | ocsp_expiry | str | The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations. | +| unified_crl | typing.Union[bool, cdktf.IResolvable] | Enables unified CRL and OCSP building. | +| unified_crl_on_existing_paths | typing.Union[bool, cdktf.IResolvable] | Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. | --- @@ -150,6 +156,16 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault --- +##### `cross_cluster_revocation`Optional + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +Enable cross-cluster revocation request queues. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation} + +--- + ##### `delta_rebuild_interval`Optional - *Type:* str @@ -231,6 +247,26 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault --- +##### `unified_crl`Optional + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +Enables unified CRL and OCSP building. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl} + +--- + +##### `unified_crl_on_existing_paths`Optional + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths} + +--- + #### Methods | **Name** | **Description** | @@ -253,6 +289,7 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault | interpolation_for_attribute | *No description.* | | reset_auto_rebuild | *No description.* | | reset_auto_rebuild_grace_period | *No description.* | +| reset_cross_cluster_revocation | *No description.* | | reset_delta_rebuild_interval | *No description.* | | reset_disable | *No description.* | | reset_enable_delta | *No description.* | @@ -261,6 +298,8 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault | reset_namespace | *No description.* | | reset_ocsp_disable | *No description.* | | reset_ocsp_expiry | *No description.* | +| reset_unified_crl | *No description.* | +| reset_unified_crl_on_existing_paths | *No description.* | --- @@ -485,6 +524,12 @@ def reset_auto_rebuild() -> None def reset_auto_rebuild_grace_period() -> None ``` +##### `reset_cross_cluster_revocation` + +```python +def reset_cross_cluster_revocation() -> None +``` + ##### `reset_delta_rebuild_interval` ```python @@ -533,6 +578,18 @@ def reset_ocsp_disable() -> None def reset_ocsp_expiry() -> None ``` +##### `reset_unified_crl` + +```python +def reset_unified_crl() -> None +``` + +##### `reset_unified_crl_on_existing_paths` + +```python +def reset_unified_crl_on_existing_paths() -> None +``` + #### Static Functions | **Name** | **Description** | @@ -630,6 +687,7 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfig.is_terraform_resource( | auto_rebuild_grace_period_input | str | *No description.* | | auto_rebuild_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | | backend_input | str | *No description.* | +| cross_cluster_revocation_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | | delta_rebuild_interval_input | str | *No description.* | | disable_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | | enable_delta_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | @@ -638,9 +696,12 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfig.is_terraform_resource( | namespace_input | str | *No description.* | | ocsp_disable_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | | ocsp_expiry_input | str | *No description.* | +| unified_crl_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | +| unified_crl_on_existing_paths_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | | auto_rebuild | typing.Union[bool, cdktf.IResolvable] | *No description.* | | auto_rebuild_grace_period | str | *No description.* | | backend | str | *No description.* | +| cross_cluster_revocation | typing.Union[bool, cdktf.IResolvable] | *No description.* | | delta_rebuild_interval | str | *No description.* | | disable | typing.Union[bool, cdktf.IResolvable] | *No description.* | | enable_delta | typing.Union[bool, cdktf.IResolvable] | *No description.* | @@ -649,6 +710,8 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfig.is_terraform_resource( | namespace | str | *No description.* | | ocsp_disable | typing.Union[bool, cdktf.IResolvable] | *No description.* | | ocsp_expiry | str | *No description.* | +| unified_crl | typing.Union[bool, cdktf.IResolvable] | *No description.* | +| unified_crl_on_existing_paths | typing.Union[bool, cdktf.IResolvable] | *No description.* | --- @@ -824,6 +887,16 @@ backend_input: str --- +##### `cross_cluster_revocation_input`Optional + +```python +cross_cluster_revocation_input: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +--- + ##### `delta_rebuild_interval_input`Optional ```python @@ -904,6 +977,26 @@ ocsp_expiry_input: str --- +##### `unified_crl_input`Optional + +```python +unified_crl_input: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +--- + +##### `unified_crl_on_existing_paths_input`Optional + +```python +unified_crl_on_existing_paths_input: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +--- + ##### `auto_rebuild`Required ```python @@ -934,6 +1027,16 @@ backend: str --- +##### `cross_cluster_revocation`Required + +```python +cross_cluster_revocation: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +--- + ##### `delta_rebuild_interval`Required ```python @@ -1014,6 +1117,26 @@ ocsp_expiry: str --- +##### `unified_crl`Required + +```python +unified_crl: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +--- + +##### `unified_crl_on_existing_paths`Required + +```python +unified_crl_on_existing_paths: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +--- + #### Constants | **Name** | **Type** | **Description** | @@ -1052,6 +1175,7 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfigConfig( backend: str, auto_rebuild: typing.Union[bool, IResolvable] = None, auto_rebuild_grace_period: str = None, + cross_cluster_revocation: typing.Union[bool, IResolvable] = None, delta_rebuild_interval: str = None, disable: typing.Union[bool, IResolvable] = None, enable_delta: typing.Union[bool, IResolvable] = None, @@ -1059,7 +1183,9 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfigConfig( id: str = None, namespace: str = None, ocsp_disable: typing.Union[bool, IResolvable] = None, - ocsp_expiry: str = None + ocsp_expiry: str = None, + unified_crl: typing.Union[bool, IResolvable] = None, + unified_crl_on_existing_paths: typing.Union[bool, IResolvable] = None ) ``` @@ -1077,6 +1203,7 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfigConfig( | backend | str | The path of the PKI secret backend the resource belongs to. | | auto_rebuild | typing.Union[bool, cdktf.IResolvable] | Enables or disables periodic rebuilding of the CRL upon expiry. | | auto_rebuild_grace_period | str | Grace period before CRL expiry to attempt rebuild of CRL. | +| cross_cluster_revocation | typing.Union[bool, cdktf.IResolvable] | Enable cross-cluster revocation request queues. | | delta_rebuild_interval | str | Interval to check for new revocations on, to regenerate the delta CRL. | | disable | typing.Union[bool, cdktf.IResolvable] | Disables or enables CRL building. | | enable_delta | typing.Union[bool, cdktf.IResolvable] | Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL. | @@ -1085,6 +1212,8 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfigConfig( | namespace | str | Target namespace. (requires Enterprise). | | ocsp_disable | typing.Union[bool, cdktf.IResolvable] | Disables or enables the OCSP responder in Vault. | | ocsp_expiry | str | The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations. | +| unified_crl | typing.Union[bool, cdktf.IResolvable] | Enables unified CRL and OCSP building. | +| unified_crl_on_existing_paths | typing.Union[bool, cdktf.IResolvable] | Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. | --- @@ -1200,6 +1329,20 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault --- +##### `cross_cluster_revocation`Optional + +```python +cross_cluster_revocation: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +Enable cross-cluster revocation request queues. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation} + +--- + ##### `delta_rebuild_interval`Optional ```python @@ -1313,5 +1456,33 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault --- +##### `unified_crl`Optional + +```python +unified_crl: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +Enables unified CRL and OCSP building. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl} + +--- + +##### `unified_crl_on_existing_paths`Optional + +```python +unified_crl_on_existing_paths: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths} + +--- + diff --git a/docs/pkiSecretBackendCrlConfig.typescript.md b/docs/pkiSecretBackendCrlConfig.typescript.md index 852858074..d283386df 100644 --- a/docs/pkiSecretBackendCrlConfig.typescript.md +++ b/docs/pkiSecretBackendCrlConfig.typescript.md @@ -68,6 +68,7 @@ Must be unique amongst siblings in the same scope | interpolationForAttribute | *No description.* | | resetAutoRebuild | *No description.* | | resetAutoRebuildGracePeriod | *No description.* | +| resetCrossClusterRevocation | *No description.* | | resetDeltaRebuildInterval | *No description.* | | resetDisable | *No description.* | | resetEnableDelta | *No description.* | @@ -76,6 +77,8 @@ Must be unique amongst siblings in the same scope | resetNamespace | *No description.* | | resetOcspDisable | *No description.* | | resetOcspExpiry | *No description.* | +| resetUnifiedCrl | *No description.* | +| resetUnifiedCrlOnExistingPaths | *No description.* | --- @@ -275,6 +278,12 @@ public resetAutoRebuild(): void public resetAutoRebuildGracePeriod(): void ``` +##### `resetCrossClusterRevocation` + +```typescript +public resetCrossClusterRevocation(): void +``` + ##### `resetDeltaRebuildInterval` ```typescript @@ -323,6 +332,18 @@ public resetOcspDisable(): void public resetOcspExpiry(): void ``` +##### `resetUnifiedCrl` + +```typescript +public resetUnifiedCrl(): void +``` + +##### `resetUnifiedCrlOnExistingPaths` + +```typescript +public resetUnifiedCrlOnExistingPaths(): void +``` + #### Static Functions | **Name** | **Description** | @@ -414,6 +435,7 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfig.isTerraformResource(x: any) | autoRebuildGracePeriodInput | string | *No description.* | | autoRebuildInput | boolean \| cdktf.IResolvable | *No description.* | | backendInput | string | *No description.* | +| crossClusterRevocationInput | boolean \| cdktf.IResolvable | *No description.* | | deltaRebuildIntervalInput | string | *No description.* | | disableInput | boolean \| cdktf.IResolvable | *No description.* | | enableDeltaInput | boolean \| cdktf.IResolvable | *No description.* | @@ -422,9 +444,12 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfig.isTerraformResource(x: any) | namespaceInput | string | *No description.* | | ocspDisableInput | boolean \| cdktf.IResolvable | *No description.* | | ocspExpiryInput | string | *No description.* | +| unifiedCrlInput | boolean \| cdktf.IResolvable | *No description.* | +| unifiedCrlOnExistingPathsInput | boolean \| cdktf.IResolvable | *No description.* | | autoRebuild | boolean \| cdktf.IResolvable | *No description.* | | autoRebuildGracePeriod | string | *No description.* | | backend | string | *No description.* | +| crossClusterRevocation | boolean \| cdktf.IResolvable | *No description.* | | deltaRebuildInterval | string | *No description.* | | disable | boolean \| cdktf.IResolvable | *No description.* | | enableDelta | boolean \| cdktf.IResolvable | *No description.* | @@ -433,6 +458,8 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfig.isTerraformResource(x: any) | namespace | string | *No description.* | | ocspDisable | boolean \| cdktf.IResolvable | *No description.* | | ocspExpiry | string | *No description.* | +| unifiedCrl | boolean \| cdktf.IResolvable | *No description.* | +| unifiedCrlOnExistingPaths | boolean \| cdktf.IResolvable | *No description.* | --- @@ -608,6 +635,16 @@ public readonly backendInput: string; --- +##### `crossClusterRevocationInput`Optional + +```typescript +public readonly crossClusterRevocationInput: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +--- + ##### `deltaRebuildIntervalInput`Optional ```typescript @@ -688,6 +725,26 @@ public readonly ocspExpiryInput: string; --- +##### `unifiedCrlInput`Optional + +```typescript +public readonly unifiedCrlInput: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +--- + +##### `unifiedCrlOnExistingPathsInput`Optional + +```typescript +public readonly unifiedCrlOnExistingPathsInput: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +--- + ##### `autoRebuild`Required ```typescript @@ -718,6 +775,16 @@ public readonly backend: string; --- +##### `crossClusterRevocation`Required + +```typescript +public readonly crossClusterRevocation: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +--- + ##### `deltaRebuildInterval`Required ```typescript @@ -798,6 +865,26 @@ public readonly ocspExpiry: string; --- +##### `unifiedCrl`Required + +```typescript +public readonly unifiedCrl: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +--- + +##### `unifiedCrlOnExistingPaths`Required + +```typescript +public readonly unifiedCrlOnExistingPaths: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +--- + #### Constants | **Name** | **Type** | **Description** | @@ -842,6 +929,7 @@ const pkiSecretBackendCrlConfigConfig: pkiSecretBackendCrlConfig.PkiSecretBacken | backend | string | The path of the PKI secret backend the resource belongs to. | | autoRebuild | boolean \| cdktf.IResolvable | Enables or disables periodic rebuilding of the CRL upon expiry. | | autoRebuildGracePeriod | string | Grace period before CRL expiry to attempt rebuild of CRL. | +| crossClusterRevocation | boolean \| cdktf.IResolvable | Enable cross-cluster revocation request queues. | | deltaRebuildInterval | string | Interval to check for new revocations on, to regenerate the delta CRL. | | disable | boolean \| cdktf.IResolvable | Disables or enables CRL building. | | enableDelta | boolean \| cdktf.IResolvable | Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL. | @@ -850,6 +938,8 @@ const pkiSecretBackendCrlConfigConfig: pkiSecretBackendCrlConfig.PkiSecretBacken | namespace | string | Target namespace. (requires Enterprise). | | ocspDisable | boolean \| cdktf.IResolvable | Disables or enables the OCSP responder in Vault. | | ocspExpiry | string | The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations. | +| unifiedCrl | boolean \| cdktf.IResolvable | Enables unified CRL and OCSP building. | +| unifiedCrlOnExistingPaths | boolean \| cdktf.IResolvable | Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. | --- @@ -965,6 +1055,20 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault --- +##### `crossClusterRevocation`Optional + +```typescript +public readonly crossClusterRevocation: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +Enable cross-cluster revocation request queues. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation} + +--- + ##### `deltaRebuildInterval`Optional ```typescript @@ -1078,5 +1182,33 @@ Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault --- +##### `unifiedCrl`Optional + +```typescript +public readonly unifiedCrl: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +Enables unified CRL and OCSP building. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl} + +--- + +##### `unifiedCrlOnExistingPaths`Optional + +```typescript +public readonly unifiedCrlOnExistingPaths: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. + +Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths} + +--- + diff --git a/package.json b/package.json index ef8ed7fcb..1f474940a 100644 --- a/package.json +++ b/package.json @@ -150,7 +150,7 @@ "cdktf": { "provider": { "name": "registry.terraform.io/hashicorp/vault", - "version": "3.13.0" + "version": "3.14.0" } }, "resolutions": { diff --git a/src/ad-secret-backend/index.ts b/src/ad-secret-backend/index.ts index 86306ae89..b027756cf 100644 --- a/src/ad-secret-backend/index.ts +++ b/src/ad-secret-backend/index.ts @@ -258,7 +258,7 @@ export class AdSecretBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_ad_secret_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/ad-secret-library/index.ts b/src/ad-secret-library/index.ts index b4be65857..1342eda14 100644 --- a/src/ad-secret-library/index.ts +++ b/src/ad-secret-library/index.ts @@ -84,7 +84,7 @@ export class AdSecretLibrary extends cdktf.TerraformResource { terraformResourceType: 'vault_ad_secret_library', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/ad-secret-role/index.ts b/src/ad-secret-role/index.ts index 089da50d4..adfdfefff 100644 --- a/src/ad-secret-role/index.ts +++ b/src/ad-secret-role/index.ts @@ -72,7 +72,7 @@ export class AdSecretRole extends cdktf.TerraformResource { terraformResourceType: 'vault_ad_secret_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/alicloud-auth-backend-role/index.ts b/src/alicloud-auth-backend-role/index.ts index c9ab809fa..41228216a 100644 --- a/src/alicloud-auth-backend-role/index.ts +++ b/src/alicloud-auth-backend-role/index.ts @@ -120,7 +120,7 @@ export class AlicloudAuthBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_alicloud_auth_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/approle-auth-backend-login/index.ts b/src/approle-auth-backend-login/index.ts index 762ffd90d..fa3a8774f 100644 --- a/src/approle-auth-backend-login/index.ts +++ b/src/approle-auth-backend-login/index.ts @@ -66,7 +66,7 @@ export class ApproleAuthBackendLogin extends cdktf.TerraformResource { terraformResourceType: 'vault_approle_auth_backend_login', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/approle-auth-backend-role-secret-id/index.ts b/src/approle-auth-backend-role-secret-id/index.ts index 997ef70c8..a6dcf3c82 100644 --- a/src/approle-auth-backend-role-secret-id/index.ts +++ b/src/approle-auth-backend-role-secret-id/index.ts @@ -90,7 +90,7 @@ export class ApproleAuthBackendRoleSecretId extends cdktf.TerraformResource { terraformResourceType: 'vault_approle_auth_backend_role_secret_id', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/approle-auth-backend-role/index.ts b/src/approle-auth-backend-role/index.ts index c9a479438..447a6d0be 100644 --- a/src/approle-auth-backend-role/index.ts +++ b/src/approle-auth-backend-role/index.ts @@ -144,7 +144,7 @@ export class ApproleAuthBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_approle_auth_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/audit-request-header/README.md b/src/audit-request-header/README.md new file mode 100644 index 000000000..0b3845a7e --- /dev/null +++ b/src/audit-request-header/README.md @@ -0,0 +1,3 @@ +# `vault_audit_request_header` + +Refer to the Terraform Registory for docs: [`vault_audit_request_header`](https://www.terraform.io/docs/providers/vault/r/audit_request_header). diff --git a/src/audit-request-header/index.ts b/src/audit-request-header/index.ts new file mode 100644 index 000000000..ec3be0cc5 --- /dev/null +++ b/src/audit-request-header/index.ts @@ -0,0 +1,157 @@ +// https://www.terraform.io/docs/providers/vault/r/audit_request_header +// generated from terraform resource schema + +import { Construct } from 'constructs'; +import * as cdktf from 'cdktf'; + +// Configuration + +export interface AuditRequestHeaderConfig extends cdktf.TerraformMetaArguments { + /** + * Whether this header's value should be HMAC'd in the audit logs. + * + * Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#hmac AuditRequestHeader#hmac} + */ + readonly hmac?: boolean | cdktf.IResolvable; + /** + * Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#id AuditRequestHeader#id} + * + * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. + * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + */ + readonly id?: string; + /** + * The name of the request header to audit. + * + * Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#name AuditRequestHeader#name} + */ + readonly name: string; + /** + * Target namespace. (requires Enterprise) + * + * Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header#namespace AuditRequestHeader#namespace} + */ + readonly namespace?: string; +} + +/** +* Represents a {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header vault_audit_request_header} +*/ +export class AuditRequestHeader extends cdktf.TerraformResource { + + // ================= + // STATIC PROPERTIES + // ================= + public static readonly tfResourceType = "vault_audit_request_header"; + + // =========== + // INITIALIZER + // =========== + + /** + * Create a new {@link https://www.terraform.io/docs/providers/vault/r/audit_request_header vault_audit_request_header} Resource + * + * @param scope The scope in which to define this construct + * @param id The scoped construct ID. Must be unique amongst siblings in the same scope + * @param options AuditRequestHeaderConfig + */ + public constructor(scope: Construct, id: string, config: AuditRequestHeaderConfig) { + super(scope, id, { + terraformResourceType: 'vault_audit_request_header', + terraformGeneratorMetadata: { + providerName: 'vault', + providerVersion: '3.14.0', + providerVersionConstraint: '~> 3.7' + }, + provider: config.provider, + dependsOn: config.dependsOn, + count: config.count, + lifecycle: config.lifecycle, + provisioners: config.provisioners, + connection: config.connection, + forEach: config.forEach + }); + this._hmac = config.hmac; + this._id = config.id; + this._name = config.name; + this._namespace = config.namespace; + } + + // ========== + // ATTRIBUTES + // ========== + + // hmac - computed: false, optional: true, required: false + private _hmac?: boolean | cdktf.IResolvable; + public get hmac() { + return this.getBooleanAttribute('hmac'); + } + public set hmac(value: boolean | cdktf.IResolvable) { + this._hmac = value; + } + public resetHmac() { + this._hmac = undefined; + } + // Temporarily expose input value. Use with caution. + public get hmacInput() { + return this._hmac; + } + + // id - computed: true, optional: true, required: false + private _id?: string; + public get id() { + return this.getStringAttribute('id'); + } + public set id(value: string) { + this._id = value; + } + public resetId() { + this._id = undefined; + } + // Temporarily expose input value. Use with caution. + public get idInput() { + return this._id; + } + + // name - computed: false, optional: false, required: true + private _name?: string; + public get name() { + return this.getStringAttribute('name'); + } + public set name(value: string) { + this._name = value; + } + // Temporarily expose input value. Use with caution. + public get nameInput() { + return this._name; + } + + // namespace - computed: false, optional: true, required: false + private _namespace?: string; + public get namespace() { + return this.getStringAttribute('namespace'); + } + public set namespace(value: string) { + this._namespace = value; + } + public resetNamespace() { + this._namespace = undefined; + } + // Temporarily expose input value. Use with caution. + public get namespaceInput() { + return this._namespace; + } + + // ========= + // SYNTHESIS + // ========= + + protected synthesizeAttributes(): { [name: string]: any } { + return { + hmac: cdktf.booleanToTerraform(this._hmac), + id: cdktf.stringToTerraform(this._id), + name: cdktf.stringToTerraform(this._name), + namespace: cdktf.stringToTerraform(this._namespace), + }; + } +} diff --git a/src/audit/index.ts b/src/audit/index.ts index 490dc1fa9..6618dbc6b 100644 --- a/src/audit/index.ts +++ b/src/audit/index.ts @@ -78,7 +78,7 @@ export class Audit extends cdktf.TerraformResource { terraformResourceType: 'vault_audit', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/auth-backend/index.ts b/src/auth-backend/index.ts index 99bb0d1e2..6eeb7887c 100644 --- a/src/auth-backend/index.ts +++ b/src/auth-backend/index.ts @@ -368,7 +368,7 @@ export class AuthBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_auth_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/aws-auth-backend-cert/index.ts b/src/aws-auth-backend-cert/index.ts index 04896e189..1fbe055fe 100644 --- a/src/aws-auth-backend-cert/index.ts +++ b/src/aws-auth-backend-cert/index.ts @@ -72,7 +72,7 @@ export class AwsAuthBackendCert extends cdktf.TerraformResource { terraformResourceType: 'vault_aws_auth_backend_cert', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/aws-auth-backend-client/index.ts b/src/aws-auth-backend-client/index.ts index a0b8b44e1..6c1338979 100644 --- a/src/aws-auth-backend-client/index.ts +++ b/src/aws-auth-backend-client/index.ts @@ -96,7 +96,7 @@ export class AwsAuthBackendClient extends cdktf.TerraformResource { terraformResourceType: 'vault_aws_auth_backend_client', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/aws-auth-backend-config-identity/index.ts b/src/aws-auth-backend-config-identity/index.ts index e739de2db..13362e990 100644 --- a/src/aws-auth-backend-config-identity/index.ts +++ b/src/aws-auth-backend-config-identity/index.ts @@ -72,7 +72,7 @@ export class AwsAuthBackendConfigIdentity extends cdktf.TerraformResource { terraformResourceType: 'vault_aws_auth_backend_config_identity', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/aws-auth-backend-identity-whitelist/index.ts b/src/aws-auth-backend-identity-whitelist/index.ts index 5e27cba59..c0d6e4e77 100644 --- a/src/aws-auth-backend-identity-whitelist/index.ts +++ b/src/aws-auth-backend-identity-whitelist/index.ts @@ -66,7 +66,7 @@ export class AwsAuthBackendIdentityWhitelist extends cdktf.TerraformResource { terraformResourceType: 'vault_aws_auth_backend_identity_whitelist', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/aws-auth-backend-login/index.ts b/src/aws-auth-backend-login/index.ts index 694c497b2..df5af30fc 100644 --- a/src/aws-auth-backend-login/index.ts +++ b/src/aws-auth-backend-login/index.ts @@ -108,7 +108,7 @@ export class AwsAuthBackendLogin extends cdktf.TerraformResource { terraformResourceType: 'vault_aws_auth_backend_login', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/aws-auth-backend-role-tag/index.ts b/src/aws-auth-backend-role-tag/index.ts index 95550dd45..0c0358ae6 100644 --- a/src/aws-auth-backend-role-tag/index.ts +++ b/src/aws-auth-backend-role-tag/index.ts @@ -90,7 +90,7 @@ export class AwsAuthBackendRoleTag extends cdktf.TerraformResource { terraformResourceType: 'vault_aws_auth_backend_role_tag', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/aws-auth-backend-role/index.ts b/src/aws-auth-backend-role/index.ts index c5cb81ad4..8cb92b2d1 100644 --- a/src/aws-auth-backend-role/index.ts +++ b/src/aws-auth-backend-role/index.ts @@ -210,7 +210,7 @@ export class AwsAuthBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_aws_auth_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/aws-auth-backend-roletag-blacklist/index.ts b/src/aws-auth-backend-roletag-blacklist/index.ts index 75b199458..7475c1761 100644 --- a/src/aws-auth-backend-roletag-blacklist/index.ts +++ b/src/aws-auth-backend-roletag-blacklist/index.ts @@ -66,7 +66,7 @@ export class AwsAuthBackendRoletagBlacklist extends cdktf.TerraformResource { terraformResourceType: 'vault_aws_auth_backend_roletag_blacklist', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/aws-auth-backend-sts-role/index.ts b/src/aws-auth-backend-sts-role/index.ts index 63bc785de..1235f1967 100644 --- a/src/aws-auth-backend-sts-role/index.ts +++ b/src/aws-auth-backend-sts-role/index.ts @@ -66,7 +66,7 @@ export class AwsAuthBackendStsRole extends cdktf.TerraformResource { terraformResourceType: 'vault_aws_auth_backend_sts_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/aws-secret-backend-role/index.ts b/src/aws-secret-backend-role/index.ts index af5ec9b12..63d1a78dd 100644 --- a/src/aws-secret-backend-role/index.ts +++ b/src/aws-secret-backend-role/index.ts @@ -114,7 +114,7 @@ export class AwsSecretBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_aws_secret_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/aws-secret-backend/index.ts b/src/aws-secret-backend/index.ts index ffa1472a1..2b8ba2cc8 100644 --- a/src/aws-secret-backend/index.ts +++ b/src/aws-secret-backend/index.ts @@ -114,7 +114,7 @@ export class AwsSecretBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_aws_secret_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/azure-auth-backend-config/index.ts b/src/azure-auth-backend-config/index.ts index f9326b568..cd27aced6 100644 --- a/src/azure-auth-backend-config/index.ts +++ b/src/azure-auth-backend-config/index.ts @@ -84,7 +84,7 @@ export class AzureAuthBackendConfig extends cdktf.TerraformResource { terraformResourceType: 'vault_azure_auth_backend_config', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/azure-auth-backend-role/index.ts b/src/azure-auth-backend-role/index.ts index eeed1714b..4a14d3704 100644 --- a/src/azure-auth-backend-role/index.ts +++ b/src/azure-auth-backend-role/index.ts @@ -150,7 +150,7 @@ export class AzureAuthBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_azure_auth_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/azure-secret-backend-role/index.ts b/src/azure-secret-backend-role/index.ts index 682f09c62..f34dd8917 100644 --- a/src/azure-secret-backend-role/index.ts +++ b/src/azure-secret-backend-role/index.ts @@ -343,7 +343,7 @@ export class AzureSecretBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_azure_secret_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/azure-secret-backend/index.ts b/src/azure-secret-backend/index.ts index 81f48428a..aef6ff440 100644 --- a/src/azure-secret-backend/index.ts +++ b/src/azure-secret-backend/index.ts @@ -102,7 +102,7 @@ export class AzureSecretBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_azure_secret_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/cert-auth-backend-role/index.ts b/src/cert-auth-backend-role/index.ts index 0ae29de29..b9bf4c0d6 100644 --- a/src/cert-auth-backend-role/index.ts +++ b/src/cert-auth-backend-role/index.ts @@ -150,7 +150,7 @@ export class CertAuthBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_cert_auth_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/consul-secret-backend-role/index.ts b/src/consul-secret-backend-role/index.ts index 3df451f46..1f3bd328f 100644 --- a/src/consul-secret-backend-role/index.ts +++ b/src/consul-secret-backend-role/index.ts @@ -128,7 +128,7 @@ export class ConsulSecretBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_consul_secret_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/consul-secret-backend/index.ts b/src/consul-secret-backend/index.ts index f8209cf44..8c5c26834 100644 --- a/src/consul-secret-backend/index.ts +++ b/src/consul-secret-backend/index.ts @@ -126,7 +126,7 @@ export class ConsulSecretBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_consul_secret_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/data-vault-ad-access-credentials/index.ts b/src/data-vault-ad-access-credentials/index.ts index 161cdcd37..2d698d587 100644 --- a/src/data-vault-ad-access-credentials/index.ts +++ b/src/data-vault-ad-access-credentials/index.ts @@ -60,7 +60,7 @@ export class DataVaultAdAccessCredentials extends cdktf.TerraformDataSource { terraformResourceType: 'vault_ad_access_credentials', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/data-vault-approle-auth-backend-role-id/index.ts b/src/data-vault-approle-auth-backend-role-id/index.ts index 2c2720978..f849627de 100644 --- a/src/data-vault-approle-auth-backend-role-id/index.ts +++ b/src/data-vault-approle-auth-backend-role-id/index.ts @@ -60,7 +60,7 @@ export class DataVaultApproleAuthBackendRoleId extends cdktf.TerraformDataSource terraformResourceType: 'vault_approle_auth_backend_role_id', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/data-vault-auth-backend/index.ts b/src/data-vault-auth-backend/index.ts index 4108fe6d0..bd36a2e8e 100644 --- a/src/data-vault-auth-backend/index.ts +++ b/src/data-vault-auth-backend/index.ts @@ -54,7 +54,7 @@ export class DataVaultAuthBackend extends cdktf.TerraformDataSource { terraformResourceType: 'vault_auth_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/data-vault-aws-access-credentials/index.ts b/src/data-vault-aws-access-credentials/index.ts index c5843faab..0efae086a 100644 --- a/src/data-vault-aws-access-credentials/index.ts +++ b/src/data-vault-aws-access-credentials/index.ts @@ -84,7 +84,7 @@ export class DataVaultAwsAccessCredentials extends cdktf.TerraformDataSource { terraformResourceType: 'vault_aws_access_credentials', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/data-vault-azure-access-credentials/index.ts b/src/data-vault-azure-access-credentials/index.ts index 226ac2188..ab1daae21 100644 --- a/src/data-vault-azure-access-credentials/index.ts +++ b/src/data-vault-azure-access-credentials/index.ts @@ -104,7 +104,7 @@ export class DataVaultAzureAccessCredentials extends cdktf.TerraformDataSource { terraformResourceType: 'vault_azure_access_credentials', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/data-vault-gcp-auth-backend-role/index.ts b/src/data-vault-gcp-auth-backend-role/index.ts index f30c7ce54..daed2d6b6 100644 --- a/src/data-vault-gcp-auth-backend-role/index.ts +++ b/src/data-vault-gcp-auth-backend-role/index.ts @@ -114,7 +114,7 @@ export class DataVaultGcpAuthBackendRole extends cdktf.TerraformDataSource { terraformResourceType: 'vault_gcp_auth_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/data-vault-generic-secret/index.ts b/src/data-vault-generic-secret/index.ts index 4211c1d1a..8b183ea93 100644 --- a/src/data-vault-generic-secret/index.ts +++ b/src/data-vault-generic-secret/index.ts @@ -64,7 +64,7 @@ export class DataVaultGenericSecret extends cdktf.TerraformDataSource { terraformResourceType: 'vault_generic_secret', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/data-vault-identity-entity/index.ts b/src/data-vault-identity-entity/index.ts index bdd0a0e40..20334451d 100644 --- a/src/data-vault-identity-entity/index.ts +++ b/src/data-vault-identity-entity/index.ts @@ -188,7 +188,7 @@ export class DataVaultIdentityEntity extends cdktf.TerraformDataSource { terraformResourceType: 'vault_identity_entity', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/data-vault-identity-group/index.ts b/src/data-vault-identity-group/index.ts index 7812782e7..7d8f4a621 100644 --- a/src/data-vault-identity-group/index.ts +++ b/src/data-vault-identity-group/index.ts @@ -78,7 +78,7 @@ export class DataVaultIdentityGroup extends cdktf.TerraformDataSource { terraformResourceType: 'vault_identity_group', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/data-vault-identity-oidc-client-creds/index.ts b/src/data-vault-identity-oidc-client-creds/index.ts index b0903e572..33ea06274 100644 --- a/src/data-vault-identity-oidc-client-creds/index.ts +++ b/src/data-vault-identity-oidc-client-creds/index.ts @@ -54,7 +54,7 @@ export class DataVaultIdentityOidcClientCreds extends cdktf.TerraformDataSource terraformResourceType: 'vault_identity_oidc_client_creds', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/data-vault-identity-oidc-openid-config/index.ts b/src/data-vault-identity-oidc-openid-config/index.ts index a1845069b..d2d569ef3 100644 --- a/src/data-vault-identity-oidc-openid-config/index.ts +++ b/src/data-vault-identity-oidc-openid-config/index.ts @@ -54,7 +54,7 @@ export class DataVaultIdentityOidcOpenidConfig extends cdktf.TerraformDataSource terraformResourceType: 'vault_identity_oidc_openid_config', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/data-vault-identity-oidc-public-keys/index.ts b/src/data-vault-identity-oidc-public-keys/index.ts index 4f9311ea3..db1615842 100644 --- a/src/data-vault-identity-oidc-public-keys/index.ts +++ b/src/data-vault-identity-oidc-public-keys/index.ts @@ -54,7 +54,7 @@ export class DataVaultIdentityOidcPublicKeys extends cdktf.TerraformDataSource { terraformResourceType: 'vault_identity_oidc_public_keys', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/data-vault-kubernetes-auth-backend-config/index.ts b/src/data-vault-kubernetes-auth-backend-config/index.ts index 5097b6d3c..9c1a64f09 100644 --- a/src/data-vault-kubernetes-auth-backend-config/index.ts +++ b/src/data-vault-kubernetes-auth-backend-config/index.ts @@ -90,7 +90,7 @@ export class DataVaultKubernetesAuthBackendConfig extends cdktf.TerraformDataSou terraformResourceType: 'vault_kubernetes_auth_backend_config', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/data-vault-kubernetes-auth-backend-role/index.ts b/src/data-vault-kubernetes-auth-backend-role/index.ts index a801c7d3f..24598e9df 100644 --- a/src/data-vault-kubernetes-auth-backend-role/index.ts +++ b/src/data-vault-kubernetes-auth-backend-role/index.ts @@ -120,7 +120,7 @@ export class DataVaultKubernetesAuthBackendRole extends cdktf.TerraformDataSourc terraformResourceType: 'vault_kubernetes_auth_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/data-vault-kubernetes-service-account-token/index.ts b/src/data-vault-kubernetes-service-account-token/index.ts index cb541412b..5b56e779e 100644 --- a/src/data-vault-kubernetes-service-account-token/index.ts +++ b/src/data-vault-kubernetes-service-account-token/index.ts @@ -78,7 +78,7 @@ export class DataVaultKubernetesServiceAccountToken extends cdktf.TerraformDataS terraformResourceType: 'vault_kubernetes_service_account_token', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/data-vault-kv-secret-subkeys-v2/index.ts b/src/data-vault-kv-secret-subkeys-v2/index.ts index 7e9d9bf9e..2b295c2d8 100644 --- a/src/data-vault-kv-secret-subkeys-v2/index.ts +++ b/src/data-vault-kv-secret-subkeys-v2/index.ts @@ -72,7 +72,7 @@ export class DataVaultKvSecretSubkeysV2 extends cdktf.TerraformDataSource { terraformResourceType: 'vault_kv_secret_subkeys_v2', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/data-vault-kv-secret-v2/index.ts b/src/data-vault-kv-secret-v2/index.ts index 89e1df653..0455d47d5 100644 --- a/src/data-vault-kv-secret-v2/index.ts +++ b/src/data-vault-kv-secret-v2/index.ts @@ -66,7 +66,7 @@ export class DataVaultKvSecretV2 extends cdktf.TerraformDataSource { terraformResourceType: 'vault_kv_secret_v2', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/data-vault-kv-secret/index.ts b/src/data-vault-kv-secret/index.ts index c43fd129f..a6360fd13 100644 --- a/src/data-vault-kv-secret/index.ts +++ b/src/data-vault-kv-secret/index.ts @@ -54,7 +54,7 @@ export class DataVaultKvSecret extends cdktf.TerraformDataSource { terraformResourceType: 'vault_kv_secret', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/data-vault-kv-secrets-list-v2/index.ts b/src/data-vault-kv-secrets-list-v2/index.ts index 3eb6c0888..9be3d778c 100644 --- a/src/data-vault-kv-secrets-list-v2/index.ts +++ b/src/data-vault-kv-secrets-list-v2/index.ts @@ -60,7 +60,7 @@ export class DataVaultKvSecretsListV2 extends cdktf.TerraformDataSource { terraformResourceType: 'vault_kv_secrets_list_v2', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/data-vault-kv-secrets-list/index.ts b/src/data-vault-kv-secrets-list/index.ts index ebf1a99a6..8e078d7e1 100644 --- a/src/data-vault-kv-secrets-list/index.ts +++ b/src/data-vault-kv-secrets-list/index.ts @@ -54,7 +54,7 @@ export class DataVaultKvSecretsList extends cdktf.TerraformDataSource { terraformResourceType: 'vault_kv_secrets_list', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/data-vault-nomad-access-token/index.ts b/src/data-vault-nomad-access-token/index.ts index 8667cec26..99ffc745d 100644 --- a/src/data-vault-nomad-access-token/index.ts +++ b/src/data-vault-nomad-access-token/index.ts @@ -60,7 +60,7 @@ export class DataVaultNomadAccessToken extends cdktf.TerraformDataSource { terraformResourceType: 'vault_nomad_access_token', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/data-vault-policy-document/index.ts b/src/data-vault-policy-document/index.ts index 7319629e4..31474a78b 100644 --- a/src/data-vault-policy-document/index.ts +++ b/src/data-vault-policy-document/index.ts @@ -574,7 +574,7 @@ export class DataVaultPolicyDocument extends cdktf.TerraformDataSource { terraformResourceType: 'vault_policy_document', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/data-vault-raft-autopilot-state/index.ts b/src/data-vault-raft-autopilot-state/index.ts index 6f65bd13d..2eaa25e0d 100644 --- a/src/data-vault-raft-autopilot-state/index.ts +++ b/src/data-vault-raft-autopilot-state/index.ts @@ -48,7 +48,7 @@ export class DataVaultRaftAutopilotState extends cdktf.TerraformDataSource { terraformResourceType: 'vault_raft_autopilot_state', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/data-vault-transform-decode/index.ts b/src/data-vault-transform-decode/index.ts index 850e76116..60273720e 100644 --- a/src/data-vault-transform-decode/index.ts +++ b/src/data-vault-transform-decode/index.ts @@ -96,7 +96,7 @@ export class DataVaultTransformDecode extends cdktf.TerraformDataSource { terraformResourceType: 'vault_transform_decode', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/data-vault-transform-encode/index.ts b/src/data-vault-transform-encode/index.ts index 10058f27d..91753ee64 100644 --- a/src/data-vault-transform-encode/index.ts +++ b/src/data-vault-transform-encode/index.ts @@ -96,7 +96,7 @@ export class DataVaultTransformEncode extends cdktf.TerraformDataSource { terraformResourceType: 'vault_transform_encode', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/data-vault-transit-decrypt/index.ts b/src/data-vault-transit-decrypt/index.ts index 9adb6f981..cde39cd8a 100644 --- a/src/data-vault-transit-decrypt/index.ts +++ b/src/data-vault-transit-decrypt/index.ts @@ -72,7 +72,7 @@ export class DataVaultTransitDecrypt extends cdktf.TerraformDataSource { terraformResourceType: 'vault_transit_decrypt', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/data-vault-transit-encrypt/index.ts b/src/data-vault-transit-encrypt/index.ts index 88100ec69..c1cb1787a 100644 --- a/src/data-vault-transit-encrypt/index.ts +++ b/src/data-vault-transit-encrypt/index.ts @@ -78,7 +78,7 @@ export class DataVaultTransitEncrypt extends cdktf.TerraformDataSource { terraformResourceType: 'vault_transit_encrypt', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/database-secret-backend-connection/index.ts b/src/database-secret-backend-connection/index.ts index 33b752994..281b52500 100644 --- a/src/database-secret-backend-connection/index.ts +++ b/src/database-secret-backend-connection/index.ts @@ -4749,7 +4749,7 @@ export class DatabaseSecretBackendConnection extends cdktf.TerraformResource { terraformResourceType: 'vault_database_secret_backend_connection', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/database-secret-backend-role/index.ts b/src/database-secret-backend-role/index.ts index 044d4ec42..6b6dbcb1b 100644 --- a/src/database-secret-backend-role/index.ts +++ b/src/database-secret-backend-role/index.ts @@ -102,7 +102,7 @@ export class DatabaseSecretBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_database_secret_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/database-secret-backend-static-role/index.ts b/src/database-secret-backend-static-role/index.ts index 9021ca7b5..d6d88df7b 100644 --- a/src/database-secret-backend-static-role/index.ts +++ b/src/database-secret-backend-static-role/index.ts @@ -84,7 +84,7 @@ export class DatabaseSecretBackendStaticRole extends cdktf.TerraformResource { terraformResourceType: 'vault_database_secret_backend_static_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/database-secrets-mount/index.ts b/src/database-secrets-mount/index.ts index e0862e36a..12234fda8 100644 --- a/src/database-secrets-mount/index.ts +++ b/src/database-secrets-mount/index.ts @@ -8427,7 +8427,7 @@ export class DatabaseSecretsMount extends cdktf.TerraformResource { terraformResourceType: 'vault_database_secrets_mount', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/egp-policy/index.ts b/src/egp-policy/index.ts index 0e85226e9..f1cb97073 100644 --- a/src/egp-policy/index.ts +++ b/src/egp-policy/index.ts @@ -72,7 +72,7 @@ export class EgpPolicy extends cdktf.TerraformResource { terraformResourceType: 'vault_egp_policy', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/gcp-auth-backend-role/index.ts b/src/gcp-auth-backend-role/index.ts index 6ff3d3dda..3ee80df35 100644 --- a/src/gcp-auth-backend-role/index.ts +++ b/src/gcp-auth-backend-role/index.ts @@ -150,7 +150,7 @@ export class GcpAuthBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_gcp_auth_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/gcp-auth-backend/index.ts b/src/gcp-auth-backend/index.ts index 5e149b1a2..de4f857c1 100644 --- a/src/gcp-auth-backend/index.ts +++ b/src/gcp-auth-backend/index.ts @@ -248,7 +248,7 @@ export class GcpAuthBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_gcp_auth_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/gcp-secret-backend/index.ts b/src/gcp-secret-backend/index.ts index f7c002b11..8d7c4aaea 100644 --- a/src/gcp-secret-backend/index.ts +++ b/src/gcp-secret-backend/index.ts @@ -90,7 +90,7 @@ export class GcpSecretBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_gcp_secret_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/gcp-secret-impersonated-account/README.md b/src/gcp-secret-impersonated-account/README.md new file mode 100644 index 000000000..60f38993a --- /dev/null +++ b/src/gcp-secret-impersonated-account/README.md @@ -0,0 +1,3 @@ +# `vault_gcp_secret_impersonated_account` + +Refer to the Terraform Registory for docs: [`vault_gcp_secret_impersonated_account`](https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account). diff --git a/src/gcp-secret-impersonated-account/index.ts b/src/gcp-secret-impersonated-account/index.ts new file mode 100644 index 000000000..8dfd4858d --- /dev/null +++ b/src/gcp-secret-impersonated-account/index.ts @@ -0,0 +1,204 @@ +// https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account +// generated from terraform resource schema + +import { Construct } from 'constructs'; +import * as cdktf from 'cdktf'; + +// Configuration + +export interface GcpSecretImpersonatedAccountConfig extends cdktf.TerraformMetaArguments { + /** + * Path where the GCP secrets engine is mounted. + * + * Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} + */ + readonly backend: string; + /** + * Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id} + * + * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. + * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + */ + readonly id?: string; + /** + * Name of the Impersonated Account to create + * + * Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} + */ + readonly impersonatedAccount: string; + /** + * Target namespace. (requires Enterprise) + * + * Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} + */ + readonly namespace?: string; + /** + * Email of the GCP service account. + * + * Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} + */ + readonly serviceAccountEmail: string; + /** + * List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only) + * + * Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} + */ + readonly tokenScopes?: string[]; +} + +/** +* Represents a {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account} +*/ +export class GcpSecretImpersonatedAccount extends cdktf.TerraformResource { + + // ================= + // STATIC PROPERTIES + // ================= + public static readonly tfResourceType = "vault_gcp_secret_impersonated_account"; + + // =========== + // INITIALIZER + // =========== + + /** + * Create a new {@link https://www.terraform.io/docs/providers/vault/r/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account} Resource + * + * @param scope The scope in which to define this construct + * @param id The scoped construct ID. Must be unique amongst siblings in the same scope + * @param options GcpSecretImpersonatedAccountConfig + */ + public constructor(scope: Construct, id: string, config: GcpSecretImpersonatedAccountConfig) { + super(scope, id, { + terraformResourceType: 'vault_gcp_secret_impersonated_account', + terraformGeneratorMetadata: { + providerName: 'vault', + providerVersion: '3.14.0', + providerVersionConstraint: '~> 3.7' + }, + provider: config.provider, + dependsOn: config.dependsOn, + count: config.count, + lifecycle: config.lifecycle, + provisioners: config.provisioners, + connection: config.connection, + forEach: config.forEach + }); + this._backend = config.backend; + this._id = config.id; + this._impersonatedAccount = config.impersonatedAccount; + this._namespace = config.namespace; + this._serviceAccountEmail = config.serviceAccountEmail; + this._tokenScopes = config.tokenScopes; + } + + // ========== + // ATTRIBUTES + // ========== + + // backend - computed: false, optional: false, required: true + private _backend?: string; + public get backend() { + return this.getStringAttribute('backend'); + } + public set backend(value: string) { + this._backend = value; + } + // Temporarily expose input value. Use with caution. + public get backendInput() { + return this._backend; + } + + // id - computed: true, optional: true, required: false + private _id?: string; + public get id() { + return this.getStringAttribute('id'); + } + public set id(value: string) { + this._id = value; + } + public resetId() { + this._id = undefined; + } + // Temporarily expose input value. Use with caution. + public get idInput() { + return this._id; + } + + // impersonated_account - computed: false, optional: false, required: true + private _impersonatedAccount?: string; + public get impersonatedAccount() { + return this.getStringAttribute('impersonated_account'); + } + public set impersonatedAccount(value: string) { + this._impersonatedAccount = value; + } + // Temporarily expose input value. Use with caution. + public get impersonatedAccountInput() { + return this._impersonatedAccount; + } + + // namespace - computed: false, optional: true, required: false + private _namespace?: string; + public get namespace() { + return this.getStringAttribute('namespace'); + } + public set namespace(value: string) { + this._namespace = value; + } + public resetNamespace() { + this._namespace = undefined; + } + // Temporarily expose input value. Use with caution. + public get namespaceInput() { + return this._namespace; + } + + // service_account_email - computed: false, optional: false, required: true + private _serviceAccountEmail?: string; + public get serviceAccountEmail() { + return this.getStringAttribute('service_account_email'); + } + public set serviceAccountEmail(value: string) { + this._serviceAccountEmail = value; + } + // Temporarily expose input value. Use with caution. + public get serviceAccountEmailInput() { + return this._serviceAccountEmail; + } + + // service_account_project - computed: true, optional: false, required: false + public get serviceAccountProject() { + return this.getStringAttribute('service_account_project'); + } + + // token_scopes - computed: false, optional: true, required: false + private _tokenScopes?: string[]; + public get tokenScopes() { + return cdktf.Fn.tolist(this.getListAttribute('token_scopes')); + } + public set tokenScopes(value: string[]) { + this._tokenScopes = value; + } + public resetTokenScopes() { + this._tokenScopes = undefined; + } + // Temporarily expose input value. Use with caution. + public get tokenScopesInput() { + return this._tokenScopes; + } + + // ========= + // SYNTHESIS + // ========= + + protected synthesizeAttributes(): { [name: string]: any } { + return { + backend: cdktf.stringToTerraform(this._backend), + id: cdktf.stringToTerraform(this._id), + impersonated_account: cdktf.stringToTerraform(this._impersonatedAccount), + namespace: cdktf.stringToTerraform(this._namespace), + service_account_email: cdktf.stringToTerraform(this._serviceAccountEmail), + token_scopes: cdktf.listMapper(cdktf.stringToTerraform, false)(this._tokenScopes), + }; + } +} diff --git a/src/gcp-secret-roleset/index.ts b/src/gcp-secret-roleset/index.ts index 22b50a5c7..45a56a08c 100644 --- a/src/gcp-secret-roleset/index.ts +++ b/src/gcp-secret-roleset/index.ts @@ -206,7 +206,7 @@ export class GcpSecretRoleset extends cdktf.TerraformResource { terraformResourceType: 'vault_gcp_secret_roleset', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/gcp-secret-static-account/index.ts b/src/gcp-secret-static-account/index.ts index 295090a57..334b3f91c 100644 --- a/src/gcp-secret-static-account/index.ts +++ b/src/gcp-secret-static-account/index.ts @@ -206,7 +206,7 @@ export class GcpSecretStaticAccount extends cdktf.TerraformResource { terraformResourceType: 'vault_gcp_secret_static_account', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/generic-endpoint/index.ts b/src/generic-endpoint/index.ts index b5ed73669..7930b209b 100644 --- a/src/generic-endpoint/index.ts +++ b/src/generic-endpoint/index.ts @@ -84,7 +84,7 @@ export class GenericEndpoint extends cdktf.TerraformResource { terraformResourceType: 'vault_generic_endpoint', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/generic-secret/index.ts b/src/generic-secret/index.ts index b7575458f..a207e0357 100644 --- a/src/generic-secret/index.ts +++ b/src/generic-secret/index.ts @@ -72,7 +72,7 @@ export class GenericSecret extends cdktf.TerraformResource { terraformResourceType: 'vault_generic_secret', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/github-auth-backend/index.ts b/src/github-auth-backend/index.ts index 06edc7a16..af7e76df0 100644 --- a/src/github-auth-backend/index.ts +++ b/src/github-auth-backend/index.ts @@ -428,7 +428,7 @@ export class GithubAuthBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_github_auth_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/github-team/index.ts b/src/github-team/index.ts index ef41f7275..0062edce9 100644 --- a/src/github-team/index.ts +++ b/src/github-team/index.ts @@ -66,7 +66,7 @@ export class GithubTeam extends cdktf.TerraformResource { terraformResourceType: 'vault_github_team', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/github-user/index.ts b/src/github-user/index.ts index aef8c1dd7..f9663c720 100644 --- a/src/github-user/index.ts +++ b/src/github-user/index.ts @@ -66,7 +66,7 @@ export class GithubUser extends cdktf.TerraformResource { terraformResourceType: 'vault_github_user', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/identity-entity-alias/index.ts b/src/identity-entity-alias/index.ts index 156d64aff..c8a11a1ed 100644 --- a/src/identity-entity-alias/index.ts +++ b/src/identity-entity-alias/index.ts @@ -72,7 +72,7 @@ export class IdentityEntityAlias extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_entity_alias', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/identity-entity-policies/index.ts b/src/identity-entity-policies/index.ts index abbdb368f..b765c6fdb 100644 --- a/src/identity-entity-policies/index.ts +++ b/src/identity-entity-policies/index.ts @@ -66,7 +66,7 @@ export class IdentityEntityPolicies extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_entity_policies', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/identity-entity/index.ts b/src/identity-entity/index.ts index b07f1f7e0..d99555420 100644 --- a/src/identity-entity/index.ts +++ b/src/identity-entity/index.ts @@ -78,7 +78,7 @@ export class IdentityEntity extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_entity', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/identity-group-alias/index.ts b/src/identity-group-alias/index.ts index 208295d40..a9301536f 100644 --- a/src/identity-group-alias/index.ts +++ b/src/identity-group-alias/index.ts @@ -66,7 +66,7 @@ export class IdentityGroupAlias extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_group_alias', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/identity-group-member-entity-ids/index.ts b/src/identity-group-member-entity-ids/index.ts index d7b13aeef..cfd8eaa4b 100644 --- a/src/identity-group-member-entity-ids/index.ts +++ b/src/identity-group-member-entity-ids/index.ts @@ -67,7 +67,7 @@ export class IdentityGroupMemberEntityIds extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_group_member_entity_ids', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/identity-group-member-group-ids/index.ts b/src/identity-group-member-group-ids/index.ts index 0d618e7cf..79ba2b572 100644 --- a/src/identity-group-member-group-ids/index.ts +++ b/src/identity-group-member-group-ids/index.ts @@ -67,7 +67,7 @@ export class IdentityGroupMemberGroupIds extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_group_member_group_ids', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/identity-group-policies/index.ts b/src/identity-group-policies/index.ts index 46e23cc8c..9c2c83a2d 100644 --- a/src/identity-group-policies/index.ts +++ b/src/identity-group-policies/index.ts @@ -66,7 +66,7 @@ export class IdentityGroupPolicies extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_group_policies', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/identity-group/index.ts b/src/identity-group/index.ts index b5eddf919..91dfe6f30 100644 --- a/src/identity-group/index.ts +++ b/src/identity-group/index.ts @@ -102,7 +102,7 @@ export class IdentityGroup extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_group', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/identity-mfa-duo/index.ts b/src/identity-mfa-duo/index.ts index 222a6c24d..204686572 100644 --- a/src/identity-mfa-duo/index.ts +++ b/src/identity-mfa-duo/index.ts @@ -84,7 +84,7 @@ export class IdentityMfaDuo extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_mfa_duo', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/identity-mfa-login-enforcement/index.ts b/src/identity-mfa-login-enforcement/index.ts index 89f05de4a..17c95bb17 100644 --- a/src/identity-mfa-login-enforcement/index.ts +++ b/src/identity-mfa-login-enforcement/index.ts @@ -84,7 +84,7 @@ export class IdentityMfaLoginEnforcement extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_mfa_login_enforcement', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/identity-mfa-okta/index.ts b/src/identity-mfa-okta/index.ts index 008b69a7a..9100c6759 100644 --- a/src/identity-mfa-okta/index.ts +++ b/src/identity-mfa-okta/index.ts @@ -78,7 +78,7 @@ export class IdentityMfaOkta extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_mfa_okta', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/identity-mfa-pingid/index.ts b/src/identity-mfa-pingid/index.ts index 461e59399..15a51ffe6 100644 --- a/src/identity-mfa-pingid/index.ts +++ b/src/identity-mfa-pingid/index.ts @@ -60,7 +60,7 @@ export class IdentityMfaPingid extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_mfa_pingid', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/identity-mfa-totp/index.ts b/src/identity-mfa-totp/index.ts index 55594f5ca..8f0aa66ce 100644 --- a/src/identity-mfa-totp/index.ts +++ b/src/identity-mfa-totp/index.ts @@ -90,7 +90,7 @@ export class IdentityMfaTotp extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_mfa_totp', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/identity-oidc-assignment/index.ts b/src/identity-oidc-assignment/index.ts index d85ae6a0c..fdb8f1858 100644 --- a/src/identity-oidc-assignment/index.ts +++ b/src/identity-oidc-assignment/index.ts @@ -66,7 +66,7 @@ export class IdentityOidcAssignment extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_oidc_assignment', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/identity-oidc-client/index.ts b/src/identity-oidc-client/index.ts index aca30c2f9..91ebd5b5f 100644 --- a/src/identity-oidc-client/index.ts +++ b/src/identity-oidc-client/index.ts @@ -90,7 +90,7 @@ export class IdentityOidcClient extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_oidc_client', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/identity-oidc-key-allowed-client-id/index.ts b/src/identity-oidc-key-allowed-client-id/index.ts index bfbc8c42b..8ccdb3c89 100644 --- a/src/identity-oidc-key-allowed-client-id/index.ts +++ b/src/identity-oidc-key-allowed-client-id/index.ts @@ -60,7 +60,7 @@ export class IdentityOidcKeyAllowedClientId extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_oidc_key_allowed_client_id', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/identity-oidc-key/index.ts b/src/identity-oidc-key/index.ts index 92084ba33..e1904b058 100644 --- a/src/identity-oidc-key/index.ts +++ b/src/identity-oidc-key/index.ts @@ -78,7 +78,7 @@ export class IdentityOidcKey extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_oidc_key', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/identity-oidc-provider/index.ts b/src/identity-oidc-provider/index.ts index e8779b59b..46e361f38 100644 --- a/src/identity-oidc-provider/index.ts +++ b/src/identity-oidc-provider/index.ts @@ -78,7 +78,7 @@ export class IdentityOidcProvider extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_oidc_provider', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/identity-oidc-role/index.ts b/src/identity-oidc-role/index.ts index 6c38c66a6..273e6bf6c 100644 --- a/src/identity-oidc-role/index.ts +++ b/src/identity-oidc-role/index.ts @@ -78,7 +78,7 @@ export class IdentityOidcRole extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_oidc_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/identity-oidc-scope/index.ts b/src/identity-oidc-scope/index.ts index ac6c7166f..f39a4ec41 100644 --- a/src/identity-oidc-scope/index.ts +++ b/src/identity-oidc-scope/index.ts @@ -66,7 +66,7 @@ export class IdentityOidcScope extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_oidc_scope', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/identity-oidc/index.ts b/src/identity-oidc/index.ts index f0a32b3c3..2990c2c69 100644 --- a/src/identity-oidc/index.ts +++ b/src/identity-oidc/index.ts @@ -54,7 +54,7 @@ export class IdentityOidc extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_oidc', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/index.ts b/src/index.ts index c115548c9..e3fc9efc3 100644 --- a/src/index.ts +++ b/src/index.ts @@ -7,6 +7,7 @@ export * as approleAuthBackendLogin from './approle-auth-backend-login'; export * as approleAuthBackendRole from './approle-auth-backend-role'; export * as approleAuthBackendRoleSecretId from './approle-auth-backend-role-secret-id'; export * as audit from './audit'; +export * as auditRequestHeader from './audit-request-header'; export * as authBackend from './auth-backend'; export * as awsAuthBackendCert from './aws-auth-backend-cert'; export * as awsAuthBackendClient from './aws-auth-backend-client'; @@ -34,6 +35,7 @@ export * as egpPolicy from './egp-policy'; export * as gcpAuthBackend from './gcp-auth-backend'; export * as gcpAuthBackendRole from './gcp-auth-backend-role'; export * as gcpSecretBackend from './gcp-secret-backend'; +export * as gcpSecretImpersonatedAccount from './gcp-secret-impersonated-account'; export * as gcpSecretRoleset from './gcp-secret-roleset'; export * as gcpSecretStaticAccount from './gcp-secret-static-account'; export * as genericEndpoint from './generic-endpoint'; diff --git a/src/jwt-auth-backend-role/index.ts b/src/jwt-auth-backend-role/index.ts index 8212c4cfe..2dad8575e 100644 --- a/src/jwt-auth-backend-role/index.ts +++ b/src/jwt-auth-backend-role/index.ts @@ -216,7 +216,7 @@ export class JwtAuthBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_jwt_auth_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/jwt-auth-backend/index.ts b/src/jwt-auth-backend/index.ts index 5e638b8a5..1326ba381 100644 --- a/src/jwt-auth-backend/index.ts +++ b/src/jwt-auth-backend/index.ts @@ -452,7 +452,7 @@ export class JwtAuthBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_jwt_auth_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/kmip-secret-backend/index.ts b/src/kmip-secret-backend/index.ts index df505c962..7ca8b1613 100644 --- a/src/kmip-secret-backend/index.ts +++ b/src/kmip-secret-backend/index.ts @@ -120,7 +120,7 @@ export class KmipSecretBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_kmip_secret_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/kmip-secret-role/index.ts b/src/kmip-secret-role/index.ts index a4eec11a2..acc506c8e 100644 --- a/src/kmip-secret-role/index.ts +++ b/src/kmip-secret-role/index.ts @@ -168,7 +168,7 @@ export class KmipSecretRole extends cdktf.TerraformResource { terraformResourceType: 'vault_kmip_secret_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/kmip-secret-scope/index.ts b/src/kmip-secret-scope/index.ts index f677aee4b..dfb1668c5 100644 --- a/src/kmip-secret-scope/index.ts +++ b/src/kmip-secret-scope/index.ts @@ -66,7 +66,7 @@ export class KmipSecretScope extends cdktf.TerraformResource { terraformResourceType: 'vault_kmip_secret_scope', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/kubernetes-auth-backend-config/index.ts b/src/kubernetes-auth-backend-config/index.ts index b51adc5eb..ae41e53df 100644 --- a/src/kubernetes-auth-backend-config/index.ts +++ b/src/kubernetes-auth-backend-config/index.ts @@ -96,7 +96,7 @@ export class KubernetesAuthBackendConfig extends cdktf.TerraformResource { terraformResourceType: 'vault_kubernetes_auth_backend_config', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/kubernetes-auth-backend-role/index.ts b/src/kubernetes-auth-backend-role/index.ts index 5317dcaae..172652ca2 100644 --- a/src/kubernetes-auth-backend-role/index.ts +++ b/src/kubernetes-auth-backend-role/index.ts @@ -138,7 +138,7 @@ export class KubernetesAuthBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_kubernetes_auth_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/kubernetes-secret-backend-role/index.ts b/src/kubernetes-secret-backend-role/index.ts index 6af1a6fe0..fc316c5b8 100644 --- a/src/kubernetes-secret-backend-role/index.ts +++ b/src/kubernetes-secret-backend-role/index.ts @@ -120,7 +120,7 @@ export class KubernetesSecretBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_kubernetes_secret_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/kubernetes-secret-backend/index.ts b/src/kubernetes-secret-backend/index.ts index 936fde661..3f30f82a4 100644 --- a/src/kubernetes-secret-backend/index.ts +++ b/src/kubernetes-secret-backend/index.ts @@ -138,7 +138,7 @@ export class KubernetesSecretBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_kubernetes_secret_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/kv-secret-backend-v2/index.ts b/src/kv-secret-backend-v2/index.ts index 78874fe1c..ec51d776f 100644 --- a/src/kv-secret-backend-v2/index.ts +++ b/src/kv-secret-backend-v2/index.ts @@ -72,7 +72,7 @@ export class KvSecretBackendV2 extends cdktf.TerraformResource { terraformResourceType: 'vault_kv_secret_backend_v2', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/kv-secret-v2/index.ts b/src/kv-secret-v2/index.ts index 124dbe98e..2c2e400e8 100644 --- a/src/kv-secret-v2/index.ts +++ b/src/kv-secret-v2/index.ts @@ -250,7 +250,7 @@ export class KvSecretV2 extends cdktf.TerraformResource { terraformResourceType: 'vault_kv_secret_v2', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/kv-secret/index.ts b/src/kv-secret/index.ts index 6bb39590c..b2d4ad887 100644 --- a/src/kv-secret/index.ts +++ b/src/kv-secret/index.ts @@ -60,7 +60,7 @@ export class KvSecret extends cdktf.TerraformResource { terraformResourceType: 'vault_kv_secret', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/ldap-auth-backend-group/index.ts b/src/ldap-auth-backend-group/index.ts index 244fc2290..cb87f1fff 100644 --- a/src/ldap-auth-backend-group/index.ts +++ b/src/ldap-auth-backend-group/index.ts @@ -60,7 +60,7 @@ export class LdapAuthBackendGroup extends cdktf.TerraformResource { terraformResourceType: 'vault_ldap_auth_backend_group', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/ldap-auth-backend-user/index.ts b/src/ldap-auth-backend-user/index.ts index d898ba147..cef30c1ba 100644 --- a/src/ldap-auth-backend-user/index.ts +++ b/src/ldap-auth-backend-user/index.ts @@ -64,7 +64,7 @@ export class LdapAuthBackendUser extends cdktf.TerraformResource { terraformResourceType: 'vault_ldap_auth_backend_user', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/ldap-auth-backend/index.ts b/src/ldap-auth-backend/index.ts index dd639feb7..073ae4396 100644 --- a/src/ldap-auth-backend/index.ts +++ b/src/ldap-auth-backend/index.ts @@ -212,7 +212,7 @@ export class LdapAuthBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_ldap_auth_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/managed-keys/index.ts b/src/managed-keys/index.ts index 4136c1f3a..f6b56905e 100644 --- a/src/managed-keys/index.ts +++ b/src/managed-keys/index.ts @@ -1452,7 +1452,7 @@ export class ManagedKeys extends cdktf.TerraformResource { terraformResourceType: 'vault_managed_keys', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/mfa-duo/index.ts b/src/mfa-duo/index.ts index 3a4916ae7..bf80b974b 100644 --- a/src/mfa-duo/index.ts +++ b/src/mfa-duo/index.ts @@ -90,7 +90,7 @@ export class MfaDuo extends cdktf.TerraformResource { terraformResourceType: 'vault_mfa_duo', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/mfa-okta/index.ts b/src/mfa-okta/index.ts index c72f90692..80a85b8ce 100644 --- a/src/mfa-okta/index.ts +++ b/src/mfa-okta/index.ts @@ -92,7 +92,7 @@ export class MfaOkta extends cdktf.TerraformResource { terraformResourceType: 'vault_mfa_okta', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/mfa-pingid/index.ts b/src/mfa-pingid/index.ts index 8993f5150..f0cc22dec 100644 --- a/src/mfa-pingid/index.ts +++ b/src/mfa-pingid/index.ts @@ -74,7 +74,7 @@ export class MfaPingid extends cdktf.TerraformResource { terraformResourceType: 'vault_mfa_pingid', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/mfa-totp/index.ts b/src/mfa-totp/index.ts index c25c68517..84ed907d8 100644 --- a/src/mfa-totp/index.ts +++ b/src/mfa-totp/index.ts @@ -98,7 +98,7 @@ export class MfaTotp extends cdktf.TerraformResource { terraformResourceType: 'vault_mfa_totp', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/mount/index.ts b/src/mount/index.ts index cf8d9a4e7..87551b67d 100644 --- a/src/mount/index.ts +++ b/src/mount/index.ts @@ -120,7 +120,7 @@ export class Mount extends cdktf.TerraformResource { terraformResourceType: 'vault_mount', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/namespace/index.ts b/src/namespace/index.ts index 72e337c52..03fef180f 100644 --- a/src/namespace/index.ts +++ b/src/namespace/index.ts @@ -60,7 +60,7 @@ export class Namespace extends cdktf.TerraformResource { terraformResourceType: 'vault_namespace', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/nomad-secret-backend/index.ts b/src/nomad-secret-backend/index.ts index 98dc2d973..8a37c814f 100644 --- a/src/nomad-secret-backend/index.ts +++ b/src/nomad-secret-backend/index.ts @@ -132,7 +132,7 @@ export class NomadSecretBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_nomad_secret_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/nomad-secret-role/index.ts b/src/nomad-secret-role/index.ts index dd3fa86f6..88cbdc5d7 100644 --- a/src/nomad-secret-role/index.ts +++ b/src/nomad-secret-role/index.ts @@ -78,7 +78,7 @@ export class NomadSecretRole extends cdktf.TerraformResource { terraformResourceType: 'vault_nomad_secret_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/okta-auth-backend-group/index.ts b/src/okta-auth-backend-group/index.ts index 71195c07f..922609c70 100644 --- a/src/okta-auth-backend-group/index.ts +++ b/src/okta-auth-backend-group/index.ts @@ -66,7 +66,7 @@ export class OktaAuthBackendGroupA extends cdktf.TerraformResource { terraformResourceType: 'vault_okta_auth_backend_group', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/okta-auth-backend-user/index.ts b/src/okta-auth-backend-user/index.ts index 20cd1c1cf..70af16cc0 100644 --- a/src/okta-auth-backend-user/index.ts +++ b/src/okta-auth-backend-user/index.ts @@ -72,7 +72,7 @@ export class OktaAuthBackendUserA extends cdktf.TerraformResource { terraformResourceType: 'vault_okta_auth_backend_user', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/okta-auth-backend/index.ts b/src/okta-auth-backend/index.ts index d1eacef35..f528ff616 100644 --- a/src/okta-auth-backend/index.ts +++ b/src/okta-auth-backend/index.ts @@ -385,7 +385,7 @@ export class OktaAuthBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_okta_auth_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/password-policy/index.ts b/src/password-policy/index.ts index 29eb888f9..9c629735c 100644 --- a/src/password-policy/index.ts +++ b/src/password-policy/index.ts @@ -60,7 +60,7 @@ export class PasswordPolicy extends cdktf.TerraformResource { terraformResourceType: 'vault_password_policy', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/pki-secret-backend-cert/index.ts b/src/pki-secret-backend-cert/index.ts index 5c1895628..b24041bbc 100644 --- a/src/pki-secret-backend-cert/index.ts +++ b/src/pki-secret-backend-cert/index.ts @@ -132,7 +132,7 @@ export class PkiSecretBackendCert extends cdktf.TerraformResource { terraformResourceType: 'vault_pki_secret_backend_cert', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/pki-secret-backend-config-ca/index.ts b/src/pki-secret-backend-config-ca/index.ts index b6902d495..1c06ae185 100644 --- a/src/pki-secret-backend-config-ca/index.ts +++ b/src/pki-secret-backend-config-ca/index.ts @@ -60,7 +60,7 @@ export class PkiSecretBackendConfigCa extends cdktf.TerraformResource { terraformResourceType: 'vault_pki_secret_backend_config_ca', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/pki-secret-backend-config-urls/index.ts b/src/pki-secret-backend-config-urls/index.ts index 9ae6e5349..3bc151f49 100644 --- a/src/pki-secret-backend-config-urls/index.ts +++ b/src/pki-secret-backend-config-urls/index.ts @@ -72,7 +72,7 @@ export class PkiSecretBackendConfigUrls extends cdktf.TerraformResource { terraformResourceType: 'vault_pki_secret_backend_config_urls', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/pki-secret-backend-crl-config/index.ts b/src/pki-secret-backend-crl-config/index.ts index 3bb0665fe..7b08a252c 100644 --- a/src/pki-secret-backend-crl-config/index.ts +++ b/src/pki-secret-backend-crl-config/index.ts @@ -26,6 +26,12 @@ export interface PkiSecretBackendCrlConfigConfig extends cdktf.TerraformMetaArgu */ readonly backend: string; /** + * Enable cross-cluster revocation request queues. + * + * Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation} + */ + readonly crossClusterRevocation?: boolean | cdktf.IResolvable; + /** * Interval to check for new revocations on, to regenerate the delta CRL. * * Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#delta_rebuild_interval PkiSecretBackendCrlConfig#delta_rebuild_interval} @@ -74,6 +80,18 @@ export interface PkiSecretBackendCrlConfigConfig extends cdktf.TerraformMetaArgu * Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#ocsp_expiry PkiSecretBackendCrlConfig#ocsp_expiry} */ readonly ocspExpiry?: string; + /** + * Enables unified CRL and OCSP building. + * + * Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl} + */ + readonly unifiedCrl?: boolean | cdktf.IResolvable; + /** + * Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. + * + * Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths} + */ + readonly unifiedCrlOnExistingPaths?: boolean | cdktf.IResolvable; } /** @@ -102,7 +120,7 @@ export class PkiSecretBackendCrlConfig extends cdktf.TerraformResource { terraformResourceType: 'vault_pki_secret_backend_crl_config', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, @@ -116,6 +134,7 @@ export class PkiSecretBackendCrlConfig extends cdktf.TerraformResource { this._autoRebuild = config.autoRebuild; this._autoRebuildGracePeriod = config.autoRebuildGracePeriod; this._backend = config.backend; + this._crossClusterRevocation = config.crossClusterRevocation; this._deltaRebuildInterval = config.deltaRebuildInterval; this._disable = config.disable; this._enableDelta = config.enableDelta; @@ -124,6 +143,8 @@ export class PkiSecretBackendCrlConfig extends cdktf.TerraformResource { this._namespace = config.namespace; this._ocspDisable = config.ocspDisable; this._ocspExpiry = config.ocspExpiry; + this._unifiedCrl = config.unifiedCrl; + this._unifiedCrlOnExistingPaths = config.unifiedCrlOnExistingPaths; } // ========== @@ -175,6 +196,22 @@ export class PkiSecretBackendCrlConfig extends cdktf.TerraformResource { return this._backend; } + // cross_cluster_revocation - computed: true, optional: true, required: false + private _crossClusterRevocation?: boolean | cdktf.IResolvable; + public get crossClusterRevocation() { + return this.getBooleanAttribute('cross_cluster_revocation'); + } + public set crossClusterRevocation(value: boolean | cdktf.IResolvable) { + this._crossClusterRevocation = value; + } + public resetCrossClusterRevocation() { + this._crossClusterRevocation = undefined; + } + // Temporarily expose input value. Use with caution. + public get crossClusterRevocationInput() { + return this._crossClusterRevocation; + } + // delta_rebuild_interval - computed: true, optional: true, required: false private _deltaRebuildInterval?: string; public get deltaRebuildInterval() { @@ -303,6 +340,38 @@ export class PkiSecretBackendCrlConfig extends cdktf.TerraformResource { return this._ocspExpiry; } + // unified_crl - computed: true, optional: true, required: false + private _unifiedCrl?: boolean | cdktf.IResolvable; + public get unifiedCrl() { + return this.getBooleanAttribute('unified_crl'); + } + public set unifiedCrl(value: boolean | cdktf.IResolvable) { + this._unifiedCrl = value; + } + public resetUnifiedCrl() { + this._unifiedCrl = undefined; + } + // Temporarily expose input value. Use with caution. + public get unifiedCrlInput() { + return this._unifiedCrl; + } + + // unified_crl_on_existing_paths - computed: true, optional: true, required: false + private _unifiedCrlOnExistingPaths?: boolean | cdktf.IResolvable; + public get unifiedCrlOnExistingPaths() { + return this.getBooleanAttribute('unified_crl_on_existing_paths'); + } + public set unifiedCrlOnExistingPaths(value: boolean | cdktf.IResolvable) { + this._unifiedCrlOnExistingPaths = value; + } + public resetUnifiedCrlOnExistingPaths() { + this._unifiedCrlOnExistingPaths = undefined; + } + // Temporarily expose input value. Use with caution. + public get unifiedCrlOnExistingPathsInput() { + return this._unifiedCrlOnExistingPaths; + } + // ========= // SYNTHESIS // ========= @@ -312,6 +381,7 @@ export class PkiSecretBackendCrlConfig extends cdktf.TerraformResource { auto_rebuild: cdktf.booleanToTerraform(this._autoRebuild), auto_rebuild_grace_period: cdktf.stringToTerraform(this._autoRebuildGracePeriod), backend: cdktf.stringToTerraform(this._backend), + cross_cluster_revocation: cdktf.booleanToTerraform(this._crossClusterRevocation), delta_rebuild_interval: cdktf.stringToTerraform(this._deltaRebuildInterval), disable: cdktf.booleanToTerraform(this._disable), enable_delta: cdktf.booleanToTerraform(this._enableDelta), @@ -320,6 +390,8 @@ export class PkiSecretBackendCrlConfig extends cdktf.TerraformResource { namespace: cdktf.stringToTerraform(this._namespace), ocsp_disable: cdktf.booleanToTerraform(this._ocspDisable), ocsp_expiry: cdktf.stringToTerraform(this._ocspExpiry), + unified_crl: cdktf.booleanToTerraform(this._unifiedCrl), + unified_crl_on_existing_paths: cdktf.booleanToTerraform(this._unifiedCrlOnExistingPaths), }; } } diff --git a/src/pki-secret-backend-intermediate-cert-request/index.ts b/src/pki-secret-backend-intermediate-cert-request/index.ts index bee658c07..246cd1656 100644 --- a/src/pki-secret-backend-intermediate-cert-request/index.ts +++ b/src/pki-secret-backend-intermediate-cert-request/index.ts @@ -181,7 +181,7 @@ export class PkiSecretBackendIntermediateCertRequest extends cdktf.TerraformReso terraformResourceType: 'vault_pki_secret_backend_intermediate_cert_request', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/pki-secret-backend-intermediate-set-signed/index.ts b/src/pki-secret-backend-intermediate-set-signed/index.ts index 973bfd719..c72bc834c 100644 --- a/src/pki-secret-backend-intermediate-set-signed/index.ts +++ b/src/pki-secret-backend-intermediate-set-signed/index.ts @@ -60,7 +60,7 @@ export class PkiSecretBackendIntermediateSetSigned extends cdktf.TerraformResour terraformResourceType: 'vault_pki_secret_backend_intermediate_set_signed', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/pki-secret-backend-role/index.ts b/src/pki-secret-backend-role/index.ts index b0955d4a0..5b41a8871 100644 --- a/src/pki-secret-backend-role/index.ts +++ b/src/pki-secret-backend-role/index.ts @@ -442,7 +442,7 @@ export class PkiSecretBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_pki_secret_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/pki-secret-backend-root-cert/index.ts b/src/pki-secret-backend-root-cert/index.ts index 7d95401b3..ddc127dc9 100644 --- a/src/pki-secret-backend-root-cert/index.ts +++ b/src/pki-secret-backend-root-cert/index.ts @@ -192,7 +192,7 @@ export class PkiSecretBackendRootCert extends cdktf.TerraformResource { terraformResourceType: 'vault_pki_secret_backend_root_cert', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/pki-secret-backend-root-sign-intermediate/index.ts b/src/pki-secret-backend-root-sign-intermediate/index.ts index bd6d6ab1f..906b4389f 100644 --- a/src/pki-secret-backend-root-sign-intermediate/index.ts +++ b/src/pki-secret-backend-root-sign-intermediate/index.ts @@ -174,7 +174,7 @@ export class PkiSecretBackendRootSignIntermediate extends cdktf.TerraformResourc terraformResourceType: 'vault_pki_secret_backend_root_sign_intermediate', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/pki-secret-backend-sign/index.ts b/src/pki-secret-backend-sign/index.ts index 9439385ab..d38e37829 100644 --- a/src/pki-secret-backend-sign/index.ts +++ b/src/pki-secret-backend-sign/index.ts @@ -126,7 +126,7 @@ export class PkiSecretBackendSign extends cdktf.TerraformResource { terraformResourceType: 'vault_pki_secret_backend_sign', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/policy/index.ts b/src/policy/index.ts index 392bf26e1..bec6a34dc 100644 --- a/src/policy/index.ts +++ b/src/policy/index.ts @@ -60,7 +60,7 @@ export class Policy extends cdktf.TerraformResource { terraformResourceType: 'vault_policy', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/provider/index.ts b/src/provider/index.ts index 3e3305d27..fbe974fb7 100644 --- a/src/provider/index.ts +++ b/src/provider/index.ts @@ -896,7 +896,7 @@ export class VaultProvider extends cdktf.TerraformProvider { terraformResourceType: 'vault', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, terraformProviderSource: 'hashicorp/vault' diff --git a/src/quota-lease-count/index.ts b/src/quota-lease-count/index.ts index f57569064..ffc4cdfac 100644 --- a/src/quota-lease-count/index.ts +++ b/src/quota-lease-count/index.ts @@ -66,7 +66,7 @@ export class QuotaLeaseCount extends cdktf.TerraformResource { terraformResourceType: 'vault_quota_lease_count', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/quota-rate-limit/index.ts b/src/quota-rate-limit/index.ts index 57a11e224..7d8134ce1 100644 --- a/src/quota-rate-limit/index.ts +++ b/src/quota-rate-limit/index.ts @@ -78,7 +78,7 @@ export class QuotaRateLimit extends cdktf.TerraformResource { terraformResourceType: 'vault_quota_rate_limit', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/rabbitmq-secret-backend-role/index.ts b/src/rabbitmq-secret-backend-role/index.ts index 1141e8ca1..f6a529fb2 100644 --- a/src/rabbitmq-secret-backend-role/index.ts +++ b/src/rabbitmq-secret-backend-role/index.ts @@ -525,7 +525,7 @@ export class RabbitmqSecretBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_rabbitmq_secret_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/rabbitmq-secret-backend/index.ts b/src/rabbitmq-secret-backend/index.ts index b700a9312..ae668d837 100644 --- a/src/rabbitmq-secret-backend/index.ts +++ b/src/rabbitmq-secret-backend/index.ts @@ -114,7 +114,7 @@ export class RabbitmqSecretBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_rabbitmq_secret_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/raft-autopilot/index.ts b/src/raft-autopilot/index.ts index bbf893fed..a26e062c5 100644 --- a/src/raft-autopilot/index.ts +++ b/src/raft-autopilot/index.ts @@ -90,7 +90,7 @@ export class RaftAutopilot extends cdktf.TerraformResource { terraformResourceType: 'vault_raft_autopilot', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/raft-snapshot-agent-config/index.ts b/src/raft-snapshot-agent-config/index.ts index 1b095bdf3..65694fb46 100644 --- a/src/raft-snapshot-agent-config/index.ts +++ b/src/raft-snapshot-agent-config/index.ts @@ -210,7 +210,7 @@ export class RaftSnapshotAgentConfig extends cdktf.TerraformResource { terraformResourceType: 'vault_raft_snapshot_agent_config', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/rgp-policy/index.ts b/src/rgp-policy/index.ts index f4b788766..e55ce7680 100644 --- a/src/rgp-policy/index.ts +++ b/src/rgp-policy/index.ts @@ -66,7 +66,7 @@ export class RgpPolicy extends cdktf.TerraformResource { terraformResourceType: 'vault_rgp_policy', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/ssh-secret-backend-ca/index.ts b/src/ssh-secret-backend-ca/index.ts index 5042c7174..efd7ca740 100644 --- a/src/ssh-secret-backend-ca/index.ts +++ b/src/ssh-secret-backend-ca/index.ts @@ -72,7 +72,7 @@ export class SshSecretBackendCa extends cdktf.TerraformResource { terraformResourceType: 'vault_ssh_secret_backend_ca', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/ssh-secret-backend-role/index.ts b/src/ssh-secret-backend-role/index.ts index 51aa36b57..e2f3c1887 100644 --- a/src/ssh-secret-backend-role/index.ts +++ b/src/ssh-secret-backend-role/index.ts @@ -271,7 +271,7 @@ export class SshSecretBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_ssh_secret_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/terraform-cloud-secret-backend/index.ts b/src/terraform-cloud-secret-backend/index.ts index ab0f30f75..3f915e6ff 100644 --- a/src/terraform-cloud-secret-backend/index.ts +++ b/src/terraform-cloud-secret-backend/index.ts @@ -96,7 +96,7 @@ export class TerraformCloudSecretBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_terraform_cloud_secret_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/terraform-cloud-secret-creds/index.ts b/src/terraform-cloud-secret-creds/index.ts index a669ec319..5570836e5 100644 --- a/src/terraform-cloud-secret-creds/index.ts +++ b/src/terraform-cloud-secret-creds/index.ts @@ -60,7 +60,7 @@ export class TerraformCloudSecretCreds extends cdktf.TerraformResource { terraformResourceType: 'vault_terraform_cloud_secret_creds', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/terraform-cloud-secret-role/index.ts b/src/terraform-cloud-secret-role/index.ts index 51a088fb8..3706d057a 100644 --- a/src/terraform-cloud-secret-role/index.ts +++ b/src/terraform-cloud-secret-role/index.ts @@ -90,7 +90,7 @@ export class TerraformCloudSecretRole extends cdktf.TerraformResource { terraformResourceType: 'vault_terraform_cloud_secret_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/token-auth-backend-role/index.ts b/src/token-auth-backend-role/index.ts index 97b7f43c8..55133c9f8 100644 --- a/src/token-auth-backend-role/index.ts +++ b/src/token-auth-backend-role/index.ts @@ -156,7 +156,7 @@ export class TokenAuthBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_token_auth_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/token/index.ts b/src/token/index.ts index d5f109766..966e7c44c 100644 --- a/src/token/index.ts +++ b/src/token/index.ts @@ -132,7 +132,7 @@ export class Token extends cdktf.TerraformResource { terraformResourceType: 'vault_token', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/transform-alphabet/index.ts b/src/transform-alphabet/index.ts index 060f1adba..2b5266dc1 100644 --- a/src/transform-alphabet/index.ts +++ b/src/transform-alphabet/index.ts @@ -66,7 +66,7 @@ export class TransformAlphabet extends cdktf.TerraformResource { terraformResourceType: 'vault_transform_alphabet', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/transform-role/index.ts b/src/transform-role/index.ts index 65afc22b2..ccc49a253 100644 --- a/src/transform-role/index.ts +++ b/src/transform-role/index.ts @@ -66,7 +66,7 @@ export class TransformRole extends cdktf.TerraformResource { terraformResourceType: 'vault_transform_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/transform-template/index.ts b/src/transform-template/index.ts index 89a7cd4e2..920fe424a 100644 --- a/src/transform-template/index.ts +++ b/src/transform-template/index.ts @@ -92,7 +92,7 @@ export class TransformTemplate extends cdktf.TerraformResource { terraformResourceType: 'vault_transform_template', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/transform-transformation/index.ts b/src/transform-transformation/index.ts index 68331c8aa..2d13c1c85 100644 --- a/src/transform-transformation/index.ts +++ b/src/transform-transformation/index.ts @@ -102,7 +102,7 @@ export class TransformTransformation extends cdktf.TerraformResource { terraformResourceType: 'vault_transform_transformation', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/transit-secret-backend-key/index.ts b/src/transit-secret-backend-key/index.ts index c80dce7a7..82e316651 100644 --- a/src/transit-secret-backend-key/index.ts +++ b/src/transit-secret-backend-key/index.ts @@ -120,7 +120,7 @@ export class TransitSecretBackendKey extends cdktf.TerraformResource { terraformResourceType: 'vault_transit_secret_backend_key', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/transit-secret-cache-config/index.ts b/src/transit-secret-cache-config/index.ts index a177bda3d..ad3652ae2 100644 --- a/src/transit-secret-cache-config/index.ts +++ b/src/transit-secret-cache-config/index.ts @@ -60,7 +60,7 @@ export class TransitSecretCacheConfig extends cdktf.TerraformResource { terraformResourceType: 'vault_transit_secret_cache_config', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.13.0', + providerVersion: '3.14.0', providerVersionConstraint: '~> 3.7' }, provider: config.provider, diff --git a/src/version.json b/src/version.json index b8b2e72ce..2ad50c67d 100644 --- a/src/version.json +++ b/src/version.json @@ -1,3 +1,3 @@ { - "registry.terraform.io/hashicorp/vault": "3.13.0" + "registry.terraform.io/hashicorp/vault": "3.14.0" }